HomeOpen Access NewsCyber Security

Cyber Security

Cybercrime: Assume breach, never trust and always verify

For decades cybercriminals have used tactics such as phishing and malware, but the convergence of two pivotal technologies sparked a dramatic surge in cybercrime.

The rise of cyber-stalking

Ernest Aduwa, Solicitor at specialist criminal defence and civil litigation firm Stokoe Partnership Solicitors, charts the rise of cyber-stalking.

The human factor in organisational cyber resilience

Here, Dr Sandra Bell discusses organisational cyber resilience and why the human factor is so crucial.

The human cost of disruption on health and well-being at work

Here, John Young, VP at Sungard AS, discusses health and well-being in a place where stress and immense pressure is normal.

The energy sector and cyber security: The other capacity gap

Anjos Nijk, Director at European Network for Cybersecurity (ENCS), discusses the skills gap within the cybersecurity industry, delving into the energy sector specifically.

How can critical national infrastructure be protected from cyber threats?

Patrick Kennedy, Security Evangelist, at Claroty discusses how to protect critical national infrastructure in the digital age.

Can the new Government Chief Digital Information Officer accelerate change?

The UK’s Cabinet office recently announced it is on the hunt for a Government Chief Digital Information Officer (GCDIO). Paul Jackson, head of public sector at Tanium discusses how this individual can overhaul the governments outdated legacy systems and boost its cybersecurity.

ENISA: Working to improve cybersecurity in Europe

Here, we find out some of the ways how the European Union Agency for Cybersecurity works to improve cybersecurity in Europe.

Will Europe become a world leader in supercomputing?

Here, we find out about the desire for Europe to become a world leader in the field of supercomputing, with comment from Roberto Viola, Director-General of DG CONNECT at the European Commission.

The Cyber Skills Immediate Impact Fund

Matt Warman, MP, Cyber Security Minister at Department for Digital, Culture, Media and Sport, tells us about the Cyber Skills Immediate Impact Fund and how it is quickly increasing the number and diversity of individuals entering the cyber security profession.

Building an advanced computing ecosystem for 21st-century research and education

Here, four experts from the National Science Foundation reveal their thoughts about building an advanced computing ecosystem for 21st-century research and education.

Data with evidence: Building the supply chain for data

Steven Sprague, Cofounder and CEO of Rivetz shares his thoughts on the importance of protecting the supply chain of data, ensuring all transactions are purposeful, intended and compliant.

Top five areas of focus for CISOs when it comes to the cloud and cybersecurity

Chief Information Security Officers (CISOs) have a key role to play in safeguarding the data increasingly stored in the cloud and mitigating cybersecurity threats, while also ensuring compliance with IT regulations, standards, and policies.

AVENUE: Designing future public transportation services with autonomous vehicles

The AVENUE H2020 project aims to design future public transportation services with autonomous vehicles, a less costly, greener solution for suburban areas, as we discover here.

Threat intelligence and the role of automation in improving security

Chris O’Brien, Director Intelligence Collaboration at EclecticIQ discusses how important it is for analysts to remember that, just because we can automate the process, doesn’t mean it isn’t worth learning, as well as the role of automation on the future.

Strengthening cybersecurity in the U.S.

Here, we take a look at the work of the Department of Homeland Security when it comes to strengthening cybersecurity in the U.S., including the Cybersecurity and Infrastructure Security Agency Cybersecurity Division.

Why trust at face value can’t fix the civil service email leaks

Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders