cloud
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
-1
archive,paged,tag,tag-cloud,tag-349,paged-14,tag-paged-14,wp-theme-stockholm,wp-child-theme-hojtcom,stockholm-core-2.4.9,select-child-theme-ver-1.0.0,select-theme-ver-9.14.4,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-8.7.2,vc_responsive

Cloud Computing: 9 Ways To Bust A Cloud – Design Reviver – Web Design Blog

Clouds computing is such a new phenomenon on the Internet technology landscape that there is often no clear idea how to protect from threats to…Continue Reading → Source: designreviver.com Cloud solutions add a new dimension to IT security. Perimeter security with firewalls etc will not be enough, when users

Geofencing Could Add Security Layer for Mobile Devices

Geofencing technology — tracking the location of a mobile device — could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries about privacy and battery life Source: www.cio.com There are many applications for

“FREAK” flaw in Android and Apple devices cripples HTTPS crypto protection

Bug forces millions of sites to use easily breakable key once thought to be dead. Source: arstechnica.com Another week, another nasty widespread security bug to worry about. This one has apparently been around since the 90s. Dubbed “FREAK” by the researchers who discovered it, the exploit allowed researchers (and

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle

American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world. Source: firstlook.org “We need to stop assuming that the phone companies will provide us with a secure method of making calls or exchanging text messages.” We need to

Loading new posts...
No more posts
Hojt Digital
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.