Posts by author
Panda Security
The Dangers of Plug-ins
Plug-ins are add-ons developed for all types of solutions and applications. All of them can cause significant security breaches at your company.
Your Company’s IT Resources are a Mine for Hackers
Bitcoin has kicked off the cryptocurrency boom. But as society’s interest in cryptocurrencies has grown, so has criminal interest.
BYOD: when protecting the perimeter is not enough
BYOD has several advantages for companies. That said, it also presents various challenges for security. What risks does BYOD entail?
Satori and the Latest Botnets to Wreak Havoc on the IoT
In this post, we take a look at some of the most dangerous botnets, as well as some of the ways that they can be combatted to protect the IoT.
Cryptocurrency. A tool for criminals?
The rise of digital currencies is causing serious concerns in the world of cybersecurity. Are cryptocurrencies mainly a tool for criminals?
Data security in the age of Big Data
Big Data poses important challenges for corporate environments: How can organizations protect ever-increasing volumes of data?
7 Frequently asked questions about the GDPR
Do not forget that keeping up with the GDPR is an active and meticulous process, but one which can be simplified and automated if with the right help. Data Control will help you to comply with the GDPR.