Does more surveillance offer more protection?
The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as counterterrorism
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Does more surveillance offer more protection?
The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as counterterrorism
Lack of encryption is putting customer data at risk
Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption. If this proves true, then many more organizations may be putting customer data at risk.
Mobile Banking Apps: How Safe are They?
Very soon, paying a visit to your local branch to pay bills or make deposits could be a thing of the past. According to KPMG, the number of mobile banking users globally is forecast to double to 1.8 billion over the next four years.
BSI drafts Internet of Things security recommendations
At last, influential policymakers are slowly becoming aware of the damages unsecured IoT devices can cause. Recent attacks on high profile targets, exploiting cameras and routers, have attracted a lot of attention. Some of the issues will not likely be solved until manufacturers ...
VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods
This year, the total value of Bitcoin transactions is expected to exceed $92bn – up around 240% from under $27bn in 2015. Users hide their identity behind nicknames and alias addresses which raise a common misconception that Bitcoin is a tool for privacy.
Making IIoT Security More Robust
The Christmas season is upon us and retailers are excitedly stocking their shelves. Once again, Internet-connected consumer gadgets, or Internet of Things (IoT) devices, are expected to be among the best-sellers this year.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.