Many articles have been published on who can do what with personal data. Some focus on particular applications or services. In the recent discussion of the availability of DNS over HTTPS, many have questioned whether software manufacturers should be responsible for default ...
Posts of category: IT Security
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
Cloud-Based Remote Access Becomes Pivotal to Managing IIoT Security
Industrial Revolution 4.0 has fundamentally changed how manufacturing systems are managed. Highly-specialized operational technology (OT) is now being joined up with Industrial Internet of Things (IIoT) devices.
Tech Privacy Moves Center Stage
The repeated failure of social media companies to properly protect personal data has so undermined consumer confidence that most people now believe total privacy is impossible in the modern digital era.
Industrial Internet of Things Security Certification in Europe
In the early days of the Internet of Things (IoT) and Industrial Internet of Things (IIoT), the potential of the new technology often overshadowed the security risks.
Facial Recognition Raises Security Stakes on Digital Signage
Facial recognition software is being embedded in digital signage to deliver a more personalized audience experience. The medium is already a target for cyber attackers and mischief makers.
Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.