Posts tagged with encryption

Cybersecurity Strategy · Data Security · Encryption

Local Laws Start to Fragment Privacy Picture

For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data. Now, for the first time, serious questions are...

Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

The Prize for Smart Cities is to Secure a Sustainable Future

At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

Blog · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

If future IIoT security lies at the Edge, then so do VPNs

It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

Blog · Data Security · Encryption

Retailers must balance data privacy with personalization

The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

Data Security · Encryption

Can Governments be trusted to keep our data private?

Governments and state agencies everywhere would like us to believe that our personal data is safe in their hands. They say this information is vital. Without it, they claim, it would be impossible to...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Eyeball spy
Encryption · Privacy · VPN

Does more surveillance offer more protection?

The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as...

big-data-1086802_1920
Data Security · Encryption · Endpoint Management · VPN

Big data, big security questions

Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

safe-913452_1920
Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

Internet of Things raises fresh security challenges for industry

For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK