Securing pharma with video surveillance

    Depending on the sector the challenges of safety and security vary, as the level of protection needs to be adjusted to the circumstances. One of these special fields is (bio)pharmaceuticals. Protecting staff, products and information are one of the main concerns and biggest challenges in the biopharma sector. In the past few years, the pharma […]

      The importance of Secure by Default

      As the cybersecurity landscape continues to evolve at a rapid pace, partly thanks to the increasing use of Internet of Things (IoT) devices, businesses are beginning to face a proliferation of threats. This enhanced risk factor has no doubt been a driver for the implementation of new legislations, such as the General Data Protection Regulation […]

        GDPR’s role in delivering a smarter, safer world

        A refreshed approach to cybersecurity has been a long time coming. Use of Internet of Things (IoT) devices, those that can connect and share data with each other in real-time, is growing exponentially and are being utilised in everything from industrial processes through to consumer devices. However, as these devices and systems have become more […]

          Joining forces to mitigate smart city cybersecurity threats

          Cities are becoming smarter as we speak. With an ambition to achieve livability, cities deploy new, innovative technologies to enable them to manage their assets and resources more efficiently. But the technology cornerstones of smart cities – connectivity, big data and IoT devices – not only offer possibilities to develop more livable cities, they also […]

            Detailing security provisions within a performance specification

            The demand for connected IoT devices is increasing. Buoyed by the productivity, security and efficiency benefits, firms worldwide have been flocking to install the latest IP technologies on their IT networks. However, this has often been done with little thought to the security ramifications. That is perhaps why new vulnerabilities are being reported all too […]