Home Search

cyber threat - search results

If you're not happy with the results, please do another search
African American Man Writing Lines Of Code On Desktop Computer With Multiple Monitors and Laptop in Creative Office. Male Data Scientist Working on Innovative Online Service For Start-up Company.

Improving software security in the public sector

UK public sector organisations are facing threats and increasingly sophisticated attacks on key infrastructure and software security.
Digital transformation concept. High speed. Agile development.

Fortifying your law firm against the SRA’s new fining powers

As the legal sector undergoes a digital transformation, law firms grapple with cybersecurity challenges, prompting a shift towards third-party payment providers.
Orange glowing cracks of lava on the surface of the planet Earth on starry background. Illustration of the concept of doomsday, apocalypse and natural disaster

The Doomsday Clock announcement: All you need to know

The Bulletin, stewards of the Doomsday Clock, will be announced on 10:00 a.m. EST/1500 GMT, January 23, 2024.
A young African - American doctor works on HUD or graphic display in front of her

WHO outline’s responsible regulations needed for Artificial Intelligence in healthcare

The World Health Organization (WHO) recently published a new document outlining essential regulatory considerations for applying artificial intelligence (AI) in healthcare.
National Flags of Canada and Vancouver City skyscrapers skyline

Science, research and innovation policy in Canada

Open Access Government provides background and updates on Canada’s science, research and innovation policy.
Looking down on two police officers in London

Innovation, learning, policing and online safety: The King’s Speech

In the King’s Speech, we saw announcements of long-term strategies to meet deficits in healthcare training, much-needed investment in mental health services and encouragement in engagement in innovative technologies, but what about policing and public safety?

Global concerns surrounding AI risks and opportunities

In a historic move, the UK Government has unveiled a comprehensive report on the capabilities and potential AI risks associated with frontier AI.
Robotic Process Automation (RPA) technology to automate business tasks with AI. Concept with expert setting up automated software on laptop computer. Digital transformation and change management.

Robotic process automation security risks and ways to eliminate them

Robotic process automation (RPA) revolutionises workflows, enhancing efficiency and reducing human error. Embracing RPA empowers businesses to streamline operations.
Big data connection technology concept

AI Ethos: How governments are adapting to age of decision intelligence

Chirag Karnik, CEO of Neyo Ltd., explains how ServiceNow AIOps and decision intelligence can redefine government operations, increase efficiency, and enhance citizen services.
Abstract background of glowing particles on a wire mesh landscape

How can UK businesses navigate the current data landscape?

As businesses eagerly anticipate the UK Government’s long-awaited Data Protection and Digital Information Bill, business leaders will need to revisit the way they approach international data transfers and ensure they can comply with new regulations.
ransomware targeting the nhs

Ransomware targeting the NHS: securing data and saving lives

Being a vital public service and large employer, the NHS must protect the sensitive data of millions. Complex IT systems increase vulnerability to cybercriminals, including ransomware targeting the NHS.

Germany’s China strategy reveals plan to restrict research cooperation

Germany's China strategy, aims to withhold federal support from research projects at risk of a "knowledge drain" to China and improve awareness of security risks in cooperation with Beijing.
Istanbul, Turkey - April 21, 2021: The electric car is being charged in Istanbul, Turkey. Eco-friendly sustainable energy concept.

Securing electric vehicle charge points is vital for consumer confidence

The market to decarbonise transport is growing with EVs, but considerations for electric vehicle charge points must be made for performance and security.
software developers using computer to write code

New technologies are transforming the data protection landscape

May 2023 marked five years since the General Data Protection Regulation (GDPR) implementation across the European Union, how has technology affected this?
Ambulance car moving at night

How NHS Tayside improved their incident response management capability

YUDU Sentinel discuss NHS Tayside choosing a new system and app to improve incident response and introduce digital documentation.
Boy and girl playing games on mobile phones while lying on bed in bedroom under the blanket. They are spending some nice time together that makes them happy.

Is the U.S. government doing enough to protect children online?

Dan Frechtling, Data Security Thought Leader, discusses the U.S. government's measures to protect children online and whether we should be doing more.
Cyber security and Network protection concept

What challenges do we face five years after the launch of the General Data...

On 25th May 2018, the EU implemented the General Data Protection Regulation; Robin Campbell-Burt discusses what's changed 5 years later.
username and password, the idea of cyber security, data protection, and secured internet access

Establishing GDPR compliance through identity governance

Managing identities and access rights have become crucial to ensuring GDPR compliance in today's data-driven world.
An abstract design of a terminal display, warning about a cyber attack. Multiple rows of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, anti-virus failure, etc...

Missing in action: Why do government bodies lose so many devices?

Government bodies are targetted by cyber criminals intending to steal sensitive data or launch a disruptive ransomware attack, says Jon Fielding.
Big data. Information concept. 3D render

How to improve security with an employee emphasis

We must improve security because the impacts of human error on cybersecurity can be immense, and one small slip-up can have disastrous impacts.

Follow Us

Advertisements