cloud
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
-1
archive,paged,tag,tag-cloud,tag-349,paged-13,tag-paged-13,wp-theme-stockholm,wp-child-theme-hojtcom,stockholm-core-2.4.9,select-child-theme-ver-1.0.0,select-theme-ver-9.14.4,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-8.7.2,vc_responsive

Security in the Cloud and Mobile with Apptimate

We start our series on cloud services with Fredrik Beckman discussing the new security challenges posed by the way mobile devices, cloud services, and the internet of things connect to enterprise netw Source: soundcloud.com I was recently interviewed by the Application Development Alliance  about my, and Apptimate’s, view of

Executive Priorities – Balancing Security and Usability

One of the most difficult things security leaders do every day is balancing the scales between keeping their organization’s critical assets safe and empowering its users to be productive. I would estimate that more CISOs have been relieved of duties for failing to strike the right

Cloud security and adoption trends

CloudPassage issued a survey to more than 250,000 members of LinkedIn’s Information Security Group and represents a broad cross section of c… Source: www.net-security.org Security is still the biggest perceived barrier to further cloud computing adoption, with 90% of respondents indicating they have moderate to severe security

Study Financial firms cite data security as top concern regarding cloud adoption

Confidentiality of data and data breaches are among the biggest concerns for financial services firms when it comes to cloud adoption. Source: www.scmagazine.com Cloud solutions add a new dimension to IT security. Perimeter security with firewalls etc will not be enough, when users need to access multiple data sources

Loading new posts...
No more posts
Hojt Digital
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.