Back to Top

security

Report: Safe Swiss Cloud is best practice for finance applications in the Cloud

A report shows best practice examples for enterprise applications by banks and financial service providers in the Cloud. Safe Swiss Cloud is one of these.

Internet of Things: Why the security of cloud and network is especially important

IoT devices are not just practical. They are also a potential security risk. It's not just devices and applications which have to be equipped to guarantee secure data. Network security in cloud systems also has to meet the highest standards.

General Data Protection Regulation (GDPR): How does the new European data-protection standard impact a company's cloud strategy?

The General Data Protection Regulation (GDPR) harmonizes the rules for the processing of personal data by private companies and public authorities throughout the EU. This forces many organizations to think again about the cloud strategy.

Driverless cars and the cloud: Without trust, no revolution!

Without high-availability data from The Cloud, driverless cars will have to remain in the garage. And only if 100% security is guaranteed in this case, this technology can revolutionize traffic.

Migration to the Cloud: the most important Questions and Answers

Here is a compilation of questions related to migrating to the cloud which we regularly encounter in discussions with our customers. 

How the health management system MyVitali gathers and processes data

The term Internet of Things (IoT) describes the tendency of computers increasingly disappearing as devices and being replaced by „intelligent things“ which exchange data through the Internet and support human users imperceptibly in their activities.There are many applications, from intelligent devices in manufacturing to everyday use in homes -  for example, the automatic control of energy consumption and household equipment. 

Data security in the cloud: Practical implications of the ISO 27018 certification

According to recent studies the majority of organizations validates recognized security procedures or certifications by independent third parties as crucial decision criterion when selecting a cloud provider.

Serious cloud providers want to be certified by independent parties to guarantee optimal security levels. However, which certification garantees optimal security?

Five things European companies can do to protect their data from industrial espionage

Recent revelations (mid-2013) of data collection by the NSA (PRISM) and GCHQ (Tempora) in cooperation with the biggest computer companies in the USA have made us aware of the massive scale at which the privacy of companies and individuals is being infringed. Here we are taking a look at what this means for European enterprises and what options they have to protect themselves against the large scale industrial espionage that is going on.