HomeOpen Access NewsCyber Security

Cyber Security

Navigating the AI frontier: Balancing innovation and security in the age of artificial intelligence

Ali Farooqui, Head of Cyber Security at BJSS, now part of CGI, explores how companies can balance the benefits of artificial intelligence (AI) with robust cybersecurity practices.

A home-invasion: The clandestine motives behind IP address targeting

Most are aware that as our time spent online has increased, so has companies’ access to our personal data: What is the truth behind IP address targeting?

How can schools and universities ensure their students’ data is safe online?

Justin Ellis, Senior Data Centre Specialist at Comms Express advises how schools and universities can ensure that their students' data is safe online by following these measures.

Helping government bring IT back in-house

OGEL IT discuss the services they provide to help the government bring IT back in-house, in this report.

How to get a job in cyber security

In this article, cyber security expert Damon Culbert outlines the current state of the industry and explains how you can get a job in cyber security.

10 reasons to become an ethical hacker

In this article, Damon Culbert explains how ethical hackers are cybersecurity experts who go head to head with cybercriminals: read his reasons why you should become an ethical hacker.

Blockchain-based identity: A tool for global innovation

Following a year of widespread data breaches and the ongoing threat to online data, it’s no surprise that digital identity has evolved as one of the most important issues facing organisations and consumers on a global scale.

How can banks prevent identity fraud?

Tim Bedard, Director, OneSpan, provides his advice on how banks can prevent identity fraud and gain the upper hand during a time of increased cyber attacks.

Businesses stuck in reactive mentality on cybersecurity

IT decision makers could be stuck in a reactive mentality on cybersecurity as they are facing major challenges between dynamic adversaries, significant legislation and regulation requirements.

5 ways cyber security in 2019 is changing and what to expect

After a whirlwind 2018, cyber security in 2019 isn't looking like an easy ride but here, Sam Bocetta, retired security analyst, provides insight into what to expect and how to prepare against possible attacks.

NHS email system needs to be more resilient

Gareth Lewis discusses how the NHS email system underpins communication between doctors, nurses and health professionals across the country every day, so what happens when it fails?

The role of biometrics in healthcare

David Orme, SVP of IDEX Biometrics, elaborates on how the role of Biometrics in healthcare can elevate clinical standards, protect staff and patients, and combat fraud.

Cybersecurity expert discusses changing world of cybercrime

Speaking to Open Access Government, cybersecurity expert and Vice President of InsideSecure, Asaf Ashekenazi discusses with us the changing world of cybercrime.

How modern technology is uniting LGBT voices

Before the UK decriminalisation of homosexuality (Sexual Offences Act 1967) and technology united LGBT voices, gay life for many men and women was very difficult: either complete denial of your true self or living a double life.

UK police want funding for crime-fighting technology

UK police call for funding for nationwide officer recruitment drive and crime-fighting technology to tackle cyber crime: read on to find out more Shared Services...

Who can see your personal data and browsing history?

With news of data breaches hitting the headlines on an alarmingly regular basis in the last few years, people are starting to give more thought to protecting their own personal data and browsing history.

Why do some countries censor the internet?

The current technological movement gives the impression that the internet is unrestrained: read on to find out about seven countries enforcing censorship of the internet.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders