Technology

Continuous penetration testing

Once a year, maybe twice if they’re cautious, businesses invite a third party to find holes in their defences, patch a few, file the PDF report, and move on. The assumption is that the security picture stays the same, but it doesn’t, not even close.

An increase in remote working could leave your business unsecure

While the big-names in business have been grabbing headlines when it comes to remote working following coronavirus, here Eacs explains that SMEs could be more vulnerable to an influx of staff working from home.

The FUDIPO Project: AI systems in process industries

Here, Erik Dahlquist discusses the FUDIPO Project, touching on how facilities like oil refineries and power plants can use AI systems.

The EU’s product liability directive and the digital era: Is a regulation revolution required?

Sylvie Gallage-Alwis, Partner, at Signature Litigation, comments on the EU’s product liability directive and the digital era and asks if a regulation revolution is required.

Women in technology: Closing the gender gap once and for all

Following the celebration of International Women’s Day on 8th March, this year 12 female technology professionals shared their advice and perspectives as to how we can close the gender gap once and for all.

Introducing the Digital Accessibility Centre (DAC)

Mike Taylor from the Digital Accessibility Centre discusses testing apps and websites for accessibility, to ensure compliance with web standards.

How to support a mobile workforce across the public sector

Sascha Giese, Head Geek™at SolarWinds, discusses how organisations can support the ever-increasing mobile workforce in the public sector.

Human firewall: How businesses can mitigate against cyber attacks

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how businesses protect themselves against cyber attacks by building a human firewall.

Digital skills gap in Europe: Training people for the future

Nabila Salem, President of Revolent Group, discusses how training people for the future can help fill the digital skills gap in Europe.

Defending against mobile phishing attacks: How the government can set an example

Tom Davison, Technical Director International at Lookout, discusses the issue of mobile phishing within the government sector and how it can protect employees inside and outside of the workplace.

Can future technology improve employee engagement? 

Robert Darling, COO at employee engagement technology firm, Eko, discusses what future technology advancements are needed for businesses looking to improve employee engagement.

Can artificial intelligence solve our societal issues?

James Lloyd-Townshend, CEO of Jefferson Frank, discusses how artificial intelligence can be used to address societal issues from healthcare to climate change and much more.

Smarter cyber security must underpin Europe’s digital future

Alyn Hockey, VP of Product Management at IT security firm, Clearswift, discusses why effective and smarter cyber security has to underpin Europe’s digital future.

Where will the fourth industrial revolution take us?

Georgia Shriane, Senior Associate at Boyes Turner, illuminates the realities of the fourth industrial revolution: Where is AI due to take us?

Top cyber tips for every personality and organisation

John Hackston, Head of Thought Leadership at The Myers-Briggs Company, offers a series of cyber tips and advice aimed at different personality types about their potential cyber security weaknesses.

Harnessing the benefits of HSCN requires more than just ‘connectivity’

Iain Shearman, MD, KCOM National Business, discusses why organisations must look beyond the procurement stage to reap the benefits of HSCN.

The importance of online security and privacy for children

Stuart Snape, Managing Partner, Graham Coffey & Co. Solicitors, provides his expert thoughts on the importance of online security and privacy for children under 13, including the key role parents play in this vein.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders