T-Systems Nordic

120 Added | 3 Magazines | 1 Follower | @tsysswe | Keep up with T-Systems Nordic on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “T-Systems Nordic”

T-Systems i Almedalen 2014: Hur kan IT stärka det svenska rättssystemet?

Seminarieprogram torsdagen den 3e juli<p>Rätt information fångar tjuven! Så effektiviserarvi informationshanteringen i rättssystemet.<p>Förmågan att …

Cloud Infrastruktur & Plattformen. IaaS & PaaS

Scalable and secure IT-Infrastructure-Solutions<p><b>Telekom offers solutions for businesses of any size.</b><p>Customers transforming their business processes …

Om polisen, Almedalen och sommaren

Polisen och andra rättsvårdande myndigheter har viktiga samhällsbärande funktioner. Deras förmåga att hantera enorma informationsmängder snabbt, …

Stefan Günzel om datasäkerhet efter Snowden

<b>Vikten att skydda känsliga personliga data har seglat upp som den viktigaste säkerhetsfrågan för T-Systems i spåren av NSA-skandalen. Och plötsligt</b> …

Deutsche Telekom and Rimowa's smart suitcases have integrated tracking

Deutsche Telekom’s T-Systems have along with luggage maker Rimowa developed a line of suitcases with GPS, Wi-Fi and GSM to help users keep track of them.<p>Machine-to-machine communications in all shapes and sizes is a returning trend at this year’s Cebit trade show in Hanover, Germany. The Bag2Go …

Cybercrime losses top $400 billion worldwide

Computer-related crimes may cause as much as $400 billion in losses annually, according to a new study that acknowledges the difficulty in estimating …

Search for Exhibitors and Products

<b>Welcome to FierceTechExec</b><p>This new, daily, email newsletter will deliver the most compelling news impacting senior IT executives across a broad range …

Are You A Digital-Ready CIO?

Digital technologies — including social media, the cloud, data analytics and mobile — are rapidly emerging as disruptive forces for businesses across …

Dubai Police testing Google Glass to track and fine traffic offenders

May 22, 2014<p>by Sayan Chakravarty<p>We all are well aware of the fact that the Dubai Police Department has the most kick-ass line-up of patrol cars in …

Reported Paris Hilton hacker cops to new intrusions targeting police | Ars Technica

Two-year hacking spree ransacked e-mail account belonging to chief of police.<p>A Massachusetts man who reportedly illegally accessed the cell phone of …

Critical new bug in crypto library leaves Linux, apps open to drive-by attacks | Ars Technica

Vulnerability in GnuTLS allows malicious sites to execute malicious code.<p>A recently discovered bug in the GnuTLS cryptographic code library puts …

Darpa lines up challengers for $2m network security silver bullet prize | V3

The US Defense Advanced Research Projects Agency (Darpa) is seeking more teams to join the 35 that have already signed up to compete in its Cyber …

Cyber-criminals have the financial strength flexibility to beat enterprise IT security - Investigating Outsourcing

IT security teams within businesses face the prospect of protecting their systems against cyber-criminals that spend more on devising their attacks …

What High Performing CXOs Do Differently?

What is it that CFOs and CHROs of high-performing companies do differently? What are the key characteristics that set them apart from others? An EY …

Know your risks to avoid IT security disasters

IT risk management depends upon solid intelligence-gathering capabilities. Faulty data can lead to devastating results.<p>Avoiding security disasters …

Your Company Is Going To Get Hacked, Will It Be Ready?

Cybersecurity experts glibly note that there are two types of organizations: those that know they’ve been hacked and those that don’t. If there is a silver lining in this observation, it is that organizations are increasingly falling into the former category. And they are preparing themselves.<p>The …

The advent of 'insanely dangerous malware'

It’s good to see national press coverage of two particularly nasty pieces of malware, Cryptolocker and GameOver Zeus. The PR machines of the FBI and …

Cyber espionage 'is threat to global economy'

Gordon Chang, author of The Coming Collapse of China, and Eurasia Group's Nicholas Consonery discuss the strained relations between the US and China<p><b>America</b> and <b>China</b> have spent the past few years in a stand-off over Chinese attitudes to intellectual property, and how the Chinese government goes …

GnuTLS library flaw could expose SSL clients, systems

A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the …

Molerats Hackers Hit BBC And European Governments

A group known as Molerats has stepped up its activities against government and financial organisations in the US and Europe<p>Security researchers have …

Palo Alto Networks report fingers UDP as major malware helper

Palo Alto Networks' annual threat analysis of customer network traffic shows that botnet-controlled malware that makes its way into enterprise …

New Gmail Data Shows the Rise of Backbone Email Encryption

Emergency services recording tools vulnerable to hackers, experts say

Researchers say the technology in use worldwide is easy to exploit and could give hackers access to confidential calls<p>Police, paramedics and the fire service in the UK are using voice-recording technology that contains severe weaknesses and could make confidential calls vulnerable to hackers, …