More and more companies are using public cloud computing resources for their IT requirements. Companies often test the water first with pilot projects to explore how cloud computing could work in their IT landscape but some, often based outside Germany, are already willing to ...
Posts of category: IT Security
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
Top Cloud Security Risks for Healthcare
Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital imaging are just some of the constantly expanding IT-based applications in ...
Intel processors: More holes than Swiss cheese?
Things had just begun to quieten down at Intel after Spectre and Meltdown, as the next dramatically named processor security vulnerabilities were announced. The ZombieLoad and Store-to-Leak Forwarding vulnerabilities already have their own website and logos,
Five Common Problems with Consumer VPNs
The recent Facebook debacle and other data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them for protecting their data at public Wi-Fi hotspots, or to digitally encrypt their information against ...
Many articles have been published on who can do what with personal data. Some focus on particular applications or services. In the recent discussion of the availability of DNS over HTTPS, many have questioned whether software manufacturers should be responsible for default ...
Cloud-Based Remote Access Becomes Pivotal to Managing IIoT Security
Industrial Revolution 4.0 has fundamentally changed how manufacturing systems are managed. Highly-specialized operational technology (OT) is now being joined up with Industrial Internet of Things (IIoT) devices.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.