Posts tagged with VPN

Eyeball spy
Encryption · Privacy · VPN

Does more surveillance offer more protection?

The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as...

iot
Internet of Things · VPN

BSI drafts Internet of Things security recommendations

At last, influential policymakers are slowly becoming aware of the damages unsecured IoT devices can cause. Recent attacks on high profile targets, exploiting cameras and routers, have attracted a lot...

internetsecurity
Mobile · VPN

Internet Security Programs for Students

Guest blog post from Daniel Waterman

street
Internet of Things · Smart City · VPN

Smart cities must respect privacy at heart

“Between the mind that plans and the hands that build there must be a Mediator, and this must be the heart.”  This famous line from Germany's 1927 masterpiece, Metropolis, continues to resonate today.

76df8aa2-2f17-4a2a-80c1-c1e450256ba4
Cloud · Data Security

Control over our data

Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are...

smart building photo
Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

Data Security · VPN

More anonymity with Tor and VPN?

Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users...

money-256314_1920
Cybersecurity Strategy · Data Security · Encryption · VPN

Trouble in store? Don’t forget VPN

For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were...

big-data-1086802_1920
Data Security · Encryption · Endpoint Management · VPN

Big data, big security questions

Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

NCP WTP Sponsor
Cybersecurity Strategy · Data Security · VPN

NCP sponsors Nürnberger Versicherungscup 2016

NCP’s mission is to help businesses perform at the top of their game through strong and agile remote data communications access. With this in mind it is appropriate that NCP is sponsoring the Women’s...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK