HomeOpen Access NewsCyber Security

Cyber Security

Home office reveals 2030 digital strategy to transform public services

The Home Office has released its 2030 Digital Strategy, outlining how the department will continue to modernise its digital, data, and technology (DDaT) capabilities over the next five years.

Industry leaders share advice on how to operate a business remotely

11 business leaders in the technology industry share their advice on how companies can avoid any potential security disasters while keeping employees happy and productive when operating a business remotely.

Coronavirus pandemic offers the public sector a chance to ‘reset’ its cybersecurity

Alyn Hockey, VP of Product Management at Clearswift, explores how the coronavirus pandemic means public sector organisations can press a ‘reset’ button on their cybersecurity practices, and allow them to be more secure in the future.

Let’s talk about resiliency, cybersecurity and working from home

In this insightful interview with Theresa Lanowitz, head of evangelism for AT&T Cybersecurity, we discuss the long term outlook of working from home and the need for tougher cybersecurity measures.

10 steps to proactive security for the public sector: Part 1

In the first article of a two-part series, Sascha Giese, Head Geek™, SolarWinds, shares 5 proactive security methods that public sector organisations should adopt in order to protect themselves against cybercriminals.

World Password Day: Strengthening password security

In recognition of this year's World Password Day, five cybersecurity experts have shared their advice for strengthening password security.

Gearing up the public sector’s cybersecurity management

John Hurst, Public Sector Sales Director, CyberArk, discusses why the public sector is in dire need to gear up its cybersecurity management.

Dangers of anonymity within a digital democracy

Stephen Ufford, Chairman of the Board at Trulioo, discusses the dangers of anonymity within a digital democracy following an increase in voting-related cybercrime.

The cybersecurity challenges of 5G and IoT

David Higgins, EMEA Technical Director at CyberArk, discusses how emerging IoT models and the expansion of 5G will open up a number of potential cybersecurity threats.

Pushing forward digital transformation in healthcare

Here, we analyse the role of the NHSX in driving digital transformation when it comes to health and social care.

Maintaining an up-to-date well-patched end-user device environment

Maintaining an up-to-date end-user device environment has been a challenge for many, but it does not need to be, Sam Newman, Technical Director of OGEL IT LTD explains.

Drawing parallels between pandemic response and cybersecurity

As cybersecurity experts begin to adapt to remote working, it is worth noting that there are strong parallels between a pandemic response and handling cybersecurity threats. Here, Raymond Pompon, Director of F5 Labs, explains why.

The issue of cybersecurity when taking work to the home

Ben Bulpett, EMEA Director, SailPoint, discusses how Coronavirus is forcing the issue of cybersecurity during the ‘flexible working revolution’

SOCCRATES: Improving detection and response to complex cyber-attacks 

The Horizon 2020 project SOCCRATES brings together some of the best expertise in the field to develop, implement and evaluate an automated security platform to defend against complex cyber-attacks, more of which is explained here by Reinder Wolthuis from TNO.

CCS launches its Cyber Security Services 3 dynamic purchasing system

Crown Commercial Service (CCS) has announced the launch of its new Cyber Security Services 3 dynamic purchasing system (DPS).

International Women’s Day: UN review the global situation for women

Let’s discuss the UN Women report, “Women’s Rights in Review 25 years after Beijing,” which documents how gender equality is functioning on International Women's Day.

Human firewall: How businesses can mitigate against cyber attacks

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how businesses protect themselves against cyber attacks by building a human firewall.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders