encryption
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
-1
archive,paged,tag,tag-encryption,tag-216,paged-18,tag-paged-18,wp-theme-stockholm,wp-child-theme-hojtcom,stockholm-core-2.4.9,select-child-theme-ver-1.0.0,select-theme-ver-9.14.4,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-8.7.2,vc_responsive

Beware the ‘visual hack’

Social engineering is by far the largest security threat to most organizations. But recent research showed that a “surgical strike” from a hacker strolling through an office as a “part-time worker” can yield a small amount of very high-value information. Source: www.cio.com Social engineering is on the

Wearable technology – vulnerabilities are too often ignored –

Whilst wearable technology and Internet of Things (IoT) are popular, security concerns are often ignored for convenience. Speaking to IT Security Guru, Dan Lamorena, senior director of HP Software Enterprise Security Products, admitted that despite there not having been a major incident yet regarding IoT or

Study Financial firms cite data security as top concern regarding cloud adoption

Confidentiality of data and data breaches are among the biggest concerns for financial services firms when it comes to cloud adoption. Source: www.scmagazine.com Cloud solutions add a new dimension to IT security. Perimeter security with firewalls etc will not be enough, when users need to access multiple data sources

Cloud Computing: 9 Ways To Bust A Cloud – Design Reviver – Web Design Blog

Clouds computing is such a new phenomenon on the Internet technology landscape that there is often no clear idea how to protect from threats to…Continue Reading → Source: designreviver.com Cloud solutions add a new dimension to IT security. Perimeter security with firewalls etc will not be enough, when users

“FREAK” flaw in Android and Apple devices cripples HTTPS crypto protection

Bug forces millions of sites to use easily breakable key once thought to be dead. Source: arstechnica.com Another week, another nasty widespread security bug to worry about. This one has apparently been around since the 90s. Dubbed “FREAK” by the researchers who discovered it, the exploit allowed researchers (and

Loading new posts...
No more posts
Hojt Digital
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.