Posts tagged with IoT

Data Security · Encryption · Internet of Things

Encryption Holds Clue to Solving AI-driven Police Surveillance Fears

Police use of Artificial Intelligence (AI) for law enforcement is coming under intense scrutiny as fears grow over its potential for misuse. Surveillance technologies with embedded AI like biometrics...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · Industry Commentary · Internet of Things

Customer Survey Highlights Secure IoT Communications and Reliable Technical Support from NCP engineering

With the rise of IoT devices in the workplace, it is becoming increasingly important for companies to build secure IoT structures. Secure networking is business-critical for enterprises, service...

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Tech Giants Talk the Data Privacy Talk

The reputation of Silicon Valley’s elite brands is in urgent need of repair. In recent years, data scandals from breaches of personal information to alleged interference with democratic elections...

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Voice-Assisted Shopping Calls for Security by Design

For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head. Today’s chains arguably set more store...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

What Will 5G Mean for Data Privacy?

President Trump’s decision to blacklist Huawei has thrust next-generation 5G data communications suddenly into the media spotlight. The Chinese telecommunications giant currently leads the world in...

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things

Top Cloud Security Risks for Healthcare

Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital...

Cybersecurity Strategy · Data Security · Internet of Things · Privacy · VPN

How to Keep IoT Devices Secure

Office environments everywhere are being transformed as more and more Internet of Things (IoT) devices enter the workplace. From intelligent air conditioning units and smart lighting to digital...

Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

The Prize for Smart Cities is to Secure a Sustainable Future

At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

rsa-conference-image_full-size
Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK