Posts tagged with Internet of Things

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

Security
Cybersecurity Strategy · Internet of Things · VPN

A priority on today’s to do list: Please secure remote access once and for all!

Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

internet-of-things
Data Security · Internet of Things · VPN

The IoT gateway next door

Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly...

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

iot
Internet of Things · VPN

BSI drafts Internet of Things security recommendations

At last, influential policymakers are slowly becoming aware of the damages unsecured IoT devices can cause. Recent attacks on high profile targets, exploiting cameras and routers, have attracted a lot...

safe-913452_1920
Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

Internet of Things raises fresh security challenges for industry

For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

Encryption · IT policy

IoT: Get Security Right The First Time

Let's start building security into the Internet of Things now, before everything becomes connected -- and hackable.

Industry Commentary · Shows · VPN

RSA 2014: Three Key Remote Access Takeaways

This year, with cryptography and information security becoming higher profile than ever before, more than 25,000 attendees made the trip to San Francisco for RSA Conference, which was filled to the...

Cloud · Industry Commentary · Rethink Remote Access · VPN

The Internet of Vulnerable Things: Why Remote Access Security is Critical

A new worm that targets embedded devices started to spread during the holiday season. The Zollard worm, which targets various devices running on Linux, has brought to light the numerous security...