In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare sectors – enterprises and security professionals are faced with the challenge of ...
Posts of category: VPN
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Smart cities – Big data meets Big Brother
Smart Cities are evolving at a phenomenal pace. Not so long ago, smart city initiatives were little more than a series of discrete pilot projects. Now, public officials worldwide have latched on to digital technology as a cure for all kinds of urban improvements – from waste ...
Hackers could use World Cup for their own end game
It’s not long now, in June the FIFA World Cup 2018 is set to kick off in Russia. Football is one of the most common shared interests in the world, fans are emotionally committed and play a big part in the success of their national teams.
Key risks for enterprises committing sensitive data to the cloud
Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have hesitated to store sensitive customer information off-premise.
Protecting Mobile Data Privacy in the Enterprise
The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature. They will very likely use them to check work emails, download files containing customer information or access privileged network content remotely without a ...
Keeping Industrial Revolution 4.0’s Treasures Hidden
The growing use of Industrial Internet of Things (IIoT) worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth industrial revolution, or Industry 4.0 for short.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.