HomeOpen Access NewsSecurity Systems

Security Systems

Simplifying EU rules for defence and sensitive security procurement

The European Union has begun work on revising its rules for the Defence and Sensitive Security Procurement Directive to create a more efficient, coordinated system that better supports the continent’s security needs.

How to prevent future cyber incidents in local schools

Despite local schools going online following the pandemic, the cybersecurity threat prevails - here's how to prevent future cyber incidents.

Protect Duty: What does it mean for the security of publicly accessible spaces?

Axis’ Steven Kenny looks at the Protect Duty, what it means for the owners and managers of publicly accessible spaces

Cybersecurity is national security for all nations

Yonatan Striem-Amit, Chief Technology Officer and Co-founder, Cybereason, provides insight into why cybersecurity is national security for all nations.

How state laws drive the future of national privacy legislation

Rob Shavell, Co-Founder and CEO of Abine/DeleteMe, discusses how “local & limited” privacy laws will shape the future of national privacy legislation.

Stabilization in Physically Unclonable Constants

Prof Riccardo Bernardini from the University of Udine tells us about the importance of stabilization in Physically Unclonable Constants.

Device management is blinding the financial sector to its serious problems

Hank Schless, Senior Manager, Security Solutions at Lookout, explores why device management is blinding the financial sector to its serious problems.

Colonial Pipeline: Inherent flaws in the national cybersecurity strategy

Miles Tappin, VP of EMEA at ThreatConnect, explores why the recent Colonial Pipeline ransomware attack has exposed a significant weakness in the US national cybersecurity strategy.

Facebook facing scrutiny should act as a reminder about the importance of GDPR

AJ Thompson, CCO Northdoor, states that Facebook facing scrutiny by European regulators should act as a reminder to all about the importance of GDPR.

Five steps towards effective CUI classification

Adam Strange, Global Marketing Director at Titus, by HelpSystems, talks us through the 5 steps towards effective CUI classification.

Cybersecurity threats to the COVID-19 vaccine

Raymond Pompon, Director of F5 Labs, looks at the cybersecurity threats to the COVID-19 vaccine amid the rise in cyber attacks since the onset of the pandemic.

Striking the balance between digital security and usability

Rick Goud, Chief Information Officer at Zivver, discusses the importance of becoming a digital enabler through implementing accessible and user-friendly security solutions.

Is it time to bolster your cybersecurity with managed data and response?

Tim Bandos, CISO at Digital Guardian, explores what managed data and response (MDR) entails and what the benefits are that it offers.

Ensuring UK border resilience in a post-Brexit world

Jean-Sebastien Connell, Consultant at Atkins, discusses the need for a security and resilience strategy for UK borders in a post-Brexit world With the UK border...

Fax machines must be eradicated across the public sector

Scott Wilson, director of service at eFax, explains why fax machines are still being widely used, the problems it causes and how they can be eradicated from both public and private sector organisations.

World Password Day: Strengthening password security

In recognition of this year's World Password Day, five cybersecurity experts have shared their advice for strengthening password security.

Data privacy in an isolationist world

As political and security landscapes evolve, the way data privacy is upheld will change significantly. Here, Rachel Roumeliotis, Strategic Content Director at O’Reilly, explores how organisations can stay protected in an isolationist world.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders