IT-Security

iLoq S50 now fully compatible with iPhone

21.02.2020 - With Apple opening its NFC (near field communications) capabilities for third parties in its latest iOS 13 operating system, it’s now even easier to use the iLoq S50 mobile access...

IT-Security

Windcloud Operates Data Centres and Cloud Computing as a Sustainable Model

13.12.2019 -

Windcloud operates data centres and cloud computing as a sustainable model with green electricity from renewable energies. In the interview withGIT SECURITY, Managing...

IT-Security

Storage for Heavy Surveillance AI Workloads

22.02.2019 -

AI demands an entirely new dimension of surveillance storagefar beyond simply supporting standard video streams. SkyHawk AI is one of the first drives of its kind. It is...

IT-Security

"State of the art" in IT Security

21.02.2019 -

In light of deficiencies in IT security in many European countries and the General Data Protection Regulation (EU) 2016/679 (GDPR) TeleTrusT - IT Security Association...

IT-Security

Whitepaper: Guidelines to Minimise Exposure to Digital Sabotage

24.01.2019 -

The BSIA has published a summary of current guidelines to minimise the exposure to digital sabotage of network connected equipment, software and systems used in...

IT-Security

Cybersecurity and Access Control

21.12.2018 -

Interconnectivity between devices, which is now seen as a priority for organizations, undoubtedly comes with an enhanced risk of security threats. Cybersecurity can no...

IT-Security

Cyber Protection Guide: How To Harden Your Mobotix Video System

17.08.2018 -

Cyber-attacks against internet connected software and hardware is a growing problem. In recent years, attackers are increasingly focused on exploiting the weakest links...

IT-Security

Taking IT security to the next level

23.05.2018 -

To authorities, data protection and IT security are a must. The district administration of Tuttlingen realized this early on and introduced Browser in the Box of Rohde...