Voice-Assisted Shopping Calls for Security by Design
For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head.
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
Voice-Assisted Shopping Calls for Security by Design
For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head.
GDPR: Has disaster been avoided or is this the calm before the storm?
Can you think back to the end of May 2018? Companies were busy flooding their customer's inboxes with emotional appeals or legal notices looking for their consent to data processing. It was shortly before the GDPR came into force
What Will 5G Mean for Data Privacy?
President Trump’s decision to blacklist Huawei has thrust next-generation 5G data communications suddenly into the media spotlight. The Chinese telecommunications giant currently leads the world in 5G equipment manufacturing.
More and more companies are using public cloud computing resources for their IT requirements. Companies often test the water first with pilot projects to explore how cloud computing could work in their IT landscape but some, often based outside Germany, are already willing to ...
Top Cloud Security Risks for Healthcare
Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital imaging are just some of the constantly expanding IT-based applications in ...
Intel processors: More holes than Swiss cheese?
Things had just begun to quieten down at Intel after Spectre and Meltdown, as the next dramatically named processor security vulnerabilities were announced. The ZombieLoad and Store-to-Leak Forwarding vulnerabilities already have their own website and logos,
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.