Business
Trend Micro has presented its IT security predictions for the coming year
In 2020, companies will primarily suffer from weaknesses that have entered their network through third-party providers, container components or supply chain attacks. Just because...
editor -
Business
Account hacked despite 2-factor authentication?
More and more companies rely on two-factor authentication. With the creativity that users have when assigning their passwords, it is no wonder that the...
editor -
Business
How Works The Safe Security Switch To VoIP
Telephone via IP networks has arrived in many companies in the recent years. The new all-IP technology has so many advantages that the classic ISDN...
editor -
Business
Cynet Leads Companies To Identify Threats To Their IT Security
Whether in the automotive industry, in mechanical and plant engineering or in the consumer goods sector - digitization does not stop at any industry....
editor -
Business
Boxcryptor Lets Companies And Individual Users Encrypt Data In The Cloud
Boxcryptor has been one of the best-known and most powerful tools when it comes to encrypting data in the cloud and making it easily...
editor -
Business
Top Features Of A CISO To Create Great Security And Business
The Chief Information Security Officer (CISO) is responsible for information and data security throughout the company. Compared to roles such as the Chief Security...
editor -