North America Analysis
Home Search

cyber threat - search results

If you're not happy with the results, please do another search
Robotic Process Automation (RPA) technology to automate business tasks with AI. Concept with expert setting up automated software on laptop computer. Digital transformation and change management.

Robotic process automation security risks and ways to eliminate them

Robotic process automation (RPA) revolutionises workflows, enhancing efficiency and reducing human error. Embracing RPA empowers businesses to streamline operations.
Big data connection technology concept

AI Ethos: How governments are adapting to age of decision intelligence

Chirag Karnik, CEO of Neyo Ltd., explains how ServiceNow AIOps and decision intelligence can redefine government operations, increase efficiency, and enhance citizen services.
Abstract background of glowing particles on a wire mesh landscape

How can UK businesses navigate the current data landscape?

As businesses eagerly anticipate the UK Government’s long-awaited Data Protection and Digital Information Bill, business leaders will need to revisit the way they approach international data transfers and ensure they can comply with new regulations.
ransomware targeting the nhs

Ransomware targeting the NHS: securing data and saving lives

Being a vital public service and large employer, the NHS must protect the sensitive data of millions. Complex IT systems increase vulnerability to cybercriminals, including ransomware targeting the NHS.

Germany’s China strategy reveals plan to restrict research cooperation

Germany's China strategy, aims to withhold federal support from research projects at risk of a "knowledge drain" to China and improve awareness of security risks in cooperation with Beijing.
Istanbul, Turkey - April 21, 2021: The electric car is being charged in Istanbul, Turkey. Eco-friendly sustainable energy concept.

Securing electric vehicle charge points is vital for consumer confidence

The market to decarbonise transport is growing with EVs, but considerations for electric vehicle charge points must be made for performance and security.
software developers using computer to write code

New technologies are transforming the data protection landscape

May 2023 marked five years since the General Data Protection Regulation (GDPR) implementation across the European Union, how has technology affected this?
Ambulance car moving at night

How NHS Tayside improved their incident response management capability

YUDU Sentinel discuss NHS Tayside choosing a new system and app to improve incident response and introduce digital documentation.
Boy and girl playing games on mobile phones while lying on bed in bedroom under the blanket. They are spending some nice time together that makes them happy.

Is the U.S. government doing enough to protect children online?

Dan Frechtling, Data Security Thought Leader, discusses the U.S. government's measures to protect children online and whether we should be doing more.
Cyber security and Network protection concept

What challenges do we face five years after the launch of the General Data...

On 25th May 2018, the EU implemented the General Data Protection Regulation; Robin Campbell-Burt discusses what's changed 5 years later.
username and password, the idea of cyber security, data protection, and secured internet access

Establishing GDPR compliance through identity governance

Managing identities and access rights have become crucial to ensuring GDPR compliance in today's data-driven world.
An abstract design of a terminal display, warning about a cyber attack. Multiple rows of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, anti-virus failure, etc...

Missing in action: Why do government bodies lose so many devices?

Government bodies are targetted by cyber criminals intending to steal sensitive data or launch a disruptive ransomware attack, says Jon Fielding.
Big data. Information concept. 3D render

How to improve security with an employee emphasis

We must improve security because the impacts of human error on cybersecurity can be immense, and one small slip-up can have disastrous impacts.
person working in a public sector building

CCS could save the public sector over £2 billion with its Energy 2 agreement

Crown Commercial Service (CCS) released their new Energy 2 agreement, expected to supply up to £51 billion of electricity and gas to the public sector.
digital identity and profile cyber crime

Healthcare’s road to recovery: why identity security is critical

Months after a ransomware attack hit parts of the NHS, the effects are still being felt – how can better identity security improve safety?
Business team with cloud computing hologram

Private-public collaboration and data visibility necessary to fight cloud attacks

As the number of cyber attacks on cloud platforms and applications increases, organisations need more collaboration and data visibility.
Encryption your data. Binary code and digital Lock. Hacker attack and data breach. Big data with encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration

Privileged access: Understanding security inside out

Mark Warren, Product Specialist at Osirium, explains why privileged access poses security issues in the public sector.
Business people working in the office, team sustainability conference

Eric van Gemeren discusses Honeywell Process Solutions

Eric van Gemeren, Chief Technology Officer for Honeywell Process Solutions, discusses Honeywell’s sustainable solutions and the environment.
Rear view of young IT specialist connecting laptop with computer while typing data on keyboard sitting at his workplace, three screens showing the same thing, a virtual desktop, VDI

The power of VDI in 2023’s evolving business landscape 

Businesses need to ensure they can provide a better experience for employees without compromising the security of their digital assets - can Virtual Desktop Infrastructure (VDI) be the key?
Automotive industry manufacture

API security risks in the automotive industry

The threat cybercrime poses to finances is known, but few recognise the risks inherent with connected cars – here's how to find vulnerabilities in API security.

Follow Open Access Government