Data protection and information security: two sides of the same coin?
Computer security – January 28, 2022
Data protection and information security: two sides of the same coin?
Data protection affects us all – privately and professionally. What data do we want to share? How, where and by whom is it processed? These are questions that concern everyone. Companies need to make sure they protect our data. I explain in the following blog what role legal requirements play in this and how companies should organize themselves when dealing with data protection and information security.
This page is currently not available in the selected language.
“Europäische Unternehmen müssen beim Datenschutz in den Wettbewerbsmodus schalten.”
He can see, hear and walk quickly and independently over rough terrain, avoiding obstacles. ANYmal is a four-legged inspection robot – the brainchild of the Zurich-based high-tech company ANYbotics – used primarily in large industry. To operate its robot, the young company turned to the large portfolio of SOLIDWORKS application solutions.
Full story
This article was published on January 28, 2022.
17Jan
Protect against ransomware, malware and spam: cloud-managed email security.
Reports about cyberattacks on companies or authorities regularly make the headlines these days. Blackmail Trojans, spyware and other malicious software find their way into computers and networks all the time, and the consequences are often catastrophic. One click is enough and financial damage, data leaks and crippled IT infrastructure become inevitable. In addition, the reputation of the company concerned suffers in the long term.
13Dec
Critical Vulnerability in Log4j – What you need to do now.
A vulnerability dubbed CVE-2021-44228 affecting Apache Log4j 2 versions 2.0 through 2.14.1 was announced on GitHub on December 9, 2021 and received the highest severity score of 10. BSI (Federal Cyber Security Authority) has declared IT Threat Level Red. Log4j 2 is an open-source Java logging library widely used in a number of software applications and services around the world.
23Nov
Microsoft Ignite 2021 – Part I: Security.
At the beginning of November, it was again this time: Microsoft Ignite. If you’re unfamiliar with the format, Ignite is an annual technology convention where the vendor showcases new products and new features of existing products. This year, Microsoft introduced more than 90 new services and updates, including for its Azure cloud platform, Dynamics 365 enterprise software, Microsoft Teams collaboration solution and Microsoft 365 productivity suite.
19Nov
Information Security Management Systems – A Key Topic.
Information Security and Computer Security – They’re essentially the same thing, aren’t they? Think again. Although the two terms are often used interchangeably, there is a big difference between them. Computer security mainly describes the management of technical systems, i.e. hardware and software. Information security, on the other hand, refers to the entire enterprise, including personnel, processes and even the architecture of the building, which demonstrates quite clearly that information security is a subject key and affects every employee. An Information Security Management System (ISMS) can help keep an overview of these complex factors and how they interact.
09Nov
Sustainability starts with design – How HP develops resource-efficient products.
Business people have always said buying is the key to profit, but that idea falls short in today’s world as surveys increasingly show that businesses and consumers are less likely to buy. be motivated to buy just because the price is low. Instead, sustainability is gaining prominence, with consumers wanting to know how a product was made, how transparent the supply chain is, what the working conditions are like in production facilities, and how well the process production is CO2 neutral. Modern companies anticipate, always keep an eye on the big picture and assume their responsibilities in terms of sustainable development.
21Oct
Prepare your network for the future with SASE and SD-WAN.
The demands on data centers are increasing, as are threats to business security. Businesses need a software-based and secure wide area network, and so they need to radically rethink their networking concepts, with SASE and SD-WAN at the core.
More posts
Warning
Bechtle AG published this content on January 28, 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unmodified, on January 28, 2022 08:05:02 UTC.
Public now 2022
|
|
|
|
|
|
|
||||
Trends in technical analysis BECHTLE AG
Short term | Middle term | Long term | |
Tendencies | Bearish | Bearish | Neutral |
Evolution of the income statement
To sell ![]() To buy |
|
Medium consensus | SURPASS |
Number of analysts | ten |
Last closing price |
€51.30 |
Average target price |
€65.60 |
Average Spread / Target | 27.9% |
Comments are closed.