HomeOpen Access NewsCyber Security

Cyber Security

Cybercrime: Assume breach, never trust and always verify

For decades cybercriminals have used tactics such as phishing and malware, but the convergence of two pivotal technologies sparked a dramatic surge in cybercrime.

Pushing forward digital transformation in healthcare

Here, we analyse the role of the NHSX in driving digital transformation when it comes to health and social care.

Maintaining an up-to-date well-patched end-user device environment

Maintaining an up-to-date end-user device environment has been a challenge for many, but it does not need to be, Sam Newman, Technical Director of OGEL IT LTD explains.

Drawing parallels between pandemic response and cybersecurity

As cybersecurity experts begin to adapt to remote working, it is worth noting that there are strong parallels between a pandemic response and handling cybersecurity threats. Here, Raymond Pompon, Director of F5 Labs, explains why.

The issue of cybersecurity when taking work to the home

Ben Bulpett, EMEA Director, SailPoint, discusses how Coronavirus is forcing the issue of cybersecurity during the ‘flexible working revolution’

SOCCRATES: Improving detection and response to complex cyber-attacks 

The Horizon 2020 project SOCCRATES brings together some of the best expertise in the field to develop, implement and evaluate an automated security platform to defend against complex cyber-attacks, more of which is explained here by Reinder Wolthuis from TNO.

CCS launches its Cyber Security Services 3 dynamic purchasing system

Crown Commercial Service (CCS) has announced the launch of its new Cyber Security Services 3 dynamic purchasing system (DPS).

International Women’s Day: UN review the global situation for women

Let’s discuss the UN Women report, “Women’s Rights in Review 25 years after Beijing,” which documents how gender equality is functioning on International Women's Day.

Human firewall: How businesses can mitigate against cyber attacks

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how businesses protect themselves against cyber attacks by building a human firewall.

Defending against mobile phishing attacks: How the government can set an example

Tom Davison, Technical Director International at Lookout, discusses the issue of mobile phishing within the government sector and how it can protect employees inside and outside of the workplace.

Smarter cyber security must underpin Europe’s digital future

Alyn Hockey, VP of Product Management at IT security firm, Clearswift, discusses why effective and smarter cyber security has to underpin Europe’s digital future.

Top cyber tips for every personality and organisation

John Hackston, Head of Thought Leadership at The Myers-Briggs Company, offers a series of cyber tips and advice aimed at different personality types about their potential cyber security weaknesses.

Growing up ‘tech savvy’ doesn’t make employees more cyber secure

Azeem Aleem, Vice President Cybersecurity Consulting, NTT Ltd, discusses how a new generation of employees is bringing new attitudes towards being cyber secure.

Cybersecurity and the tragedy of internet commons

Elisabetta Zaccaria, Strategic Advisor to Secure Chorus, discusses how we may be facing a tragedy of the internet commons problem. Is the way forward to revert to government-mandated regulation instead of market self-regulation to address global cybersecurity risks?.

European Commission: Personal cybersecurity via encrypted messaging

Signal is the messaging app that claims the highest level of personal cybersecurity: Why has the European Commission chosen this over other platforms?

Cybercriminals take advantage of coronavirus news

Avishay Zawaoznik, Security Research Manager at Imperva, describes the types of spam campaigns designed to spread fake news and the dangers they pose on our understanding of coronavirus.

Can we realistically create laws on artificial intelligence?

Chris Rourk, Partner at Jackson Walker, a member of Globalaw, talks us through the realities of attempting to create laws on artificial intelligence.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders