The Future of Enterprise Information Management

Enterprise Information Management (EIM) has evolved over the past decade and is an accustomed component of every enterprise. It is seen by many in our ever-changing and fast developing IT world as a slow moving heavy dinosaur, based on on-premise solutions. Read More

Certificate Housekeeping

Nearly every application software brings a number of certificates with it. If you ask long-term IT security experts, they typically estimate that between 30 to 3,000 certificates are installed on any given PC. In reality a standard Windows 8.1 system easily has 30,000 and more certificates. MacOS 10.6 contains 2,000 certificates. Even on a Linux system (e.g. UBUNTU 14) there are 800 certificates. Unfortunately, lots of these certificates are outdated, are provided by untrustworthy issuers or use weak cryptography. Some certificates were generated a decade ago and are still in use. Due to the fact that certificates are the trust anchors of each and every digital communication, we think it is time for an enhanced certificate housekeeping. Read More

Securing your Quantified Self

One can look at the Internet of Things in a way where sensors are embedded in the physical world, e.g. plant sites, offices, homes or humans. Sensors embedded in the physical world of  humans are also known as wearables. Wearables such as fitness trackers and the like are an important component of the Quantified Self . But wearables are more; they also include  items like smart watches and smart eyewear. Gartner expects a strong growth in the wearable market in 2015, rising 38% from 2014. Read More

Potentials for Added Value in the Automotive Industry in the Digital Transformation Age

Industry 4.0, Internet of Things, Digitalization – those are all hot topics in today’s world. But what significance do they have for future added value in the automotive industry? In today’s post, I would like to concentrate on the topic „Digitalization“. Read More

The Weakest Link in Security: The Individual

Many industrial companies have a general rule like: all information that one can obtain during work or for work is confidential or highly confidential unless that information has been published by the communication department to the outside world.

It should be every employee’s concern to protect the company’s confidential and sensitive information, this includes technology, know-how, strategy and intellectual property. Read More

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden