Jan. 24, 2019WhitepaperIT and IT-Security
The BSIA has published a summary of current guidelines to minimise the exposure to digital sabotage of network connected equipment, software and systems used in electronic security.
May. 23, 2018WhitepaperIT and IT-Security
To authorities, data protection and IT security are a must. The district administration of Tuttlingen realized this early on and introduced Browser in the Box of Rohde & Schwarz Cybersecurity on more than 800 computers.
Apr. 13, 2015WhitepaperIT and IT-Security
Manufacturing industry can only gain speed and increase flexibility with consistent, IT-assisted value chains. ...
Mar. 11, 2011WhitepaperIT and IT-Security
Protecting against the weakest linkWikiLeaks has come to international prominence (or notoriety, depending on your perspective) for its work in publishing private, secret and classified materials obtained via leaks from government ...
Feb. 10, 2011WhitepaperIT and IT-Security
Starting in November 2009, coordinated covert and targeted cyberattacks have been conducted against global oil, energy, and petrochemical companies. These attacks have involved social engineering, spear-phishing attacks, exploitation of ...
Apr. 28, 2010WhitepaperIT and IT-Security
For secure remote maintenance and diagnosis of machines and systems via the Internet, Innominate has developed a highly-available 19-inch network security solution, which is used in service centers as a high-end firewall and VPN gateway. ...
Apr. 21, 2009WhitepaperIT and IT-Security
Although an organization’s IT infrastructure is typically built to handle large amounts of data, including that of video surveillance applications, many operators are not fully leveraging the functionalities of their investments to ...
The latest information directly via newsletter.
Media Kits 2019
Follow us on LinkedIn: