Posts tagged with encryption

Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things
Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

Local Laws Start to Fragment Privacy Picture
For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data. Now, for the first time, serious questions are...

The Prize for Smart Cities is to Secure a Sustainable Future
At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

If future IIoT security lies at the Edge, then so do VPNs
It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

Retailers must balance data privacy with personalization
The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

Can Governments be trusted to keep our data private?
Governments and state agencies everywhere would like us to believe that our personal data is safe in their hands. They say this information is vital. Without it, they claim, it would be impossible to...

What does built-in IIoT security look like?
What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Does more surveillance offer more protection?
The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as...

Big data, big security questions
Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

Mobile payments and security -- money walks, money talks
Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...