Technology

Continuous penetration testing

Once a year, maybe twice if they’re cautious, businesses invite a third party to find holes in their defences, patch a few, file the PDF report, and move on. The assumption is that the security picture stays the same, but it doesn’t, not even close.

The economic importance of “digitalisation”

Alun Foster, Head of Plans and Dissemination at ECSEL JU, lifts the lid on the economic importance of “digitalisation”.

Buying innovation in the public sector

Iain C. Steel, Chief Procurement Services Officer and Caroline Ramsay, Partner at UK law firm TLT LLP detail here their thoughts on buying innovation in the public sector.

The Digital Single Market: Maximising the potential of IT within Europe

Roberto Viola Director-General of DG Connect, within the European Union, focuses on maximising the potential of IT within Europe, a vital aspect of implementing the Digital Single Market.

The rapid growth in artificial intelligence in Japan

Agnieszka Kuczynska from EU-Japan Centre for Industrial Cooperation, details the current rapid growth in artificial intelligence in Japan.

A spotlight on the future of cybersecurity in the European Union

Juhan Lepassaar, Executive Director of the European Union Agency for Cybersecurity, looks into the future of cybersecurity.

Why should we trust proof assistants?

Proof assistants are formal proof management systems, which provide a formal language to write mathematical definitions, executable algorithms and theorems, more of which here is explained by Inria Rennes - Bretagne Atlantique.

Fresh IT: Make technology work for your business with smaller, smarter projects

Organisations have gorged on lavish IT banquets and they can’t take another byte. Marc Silvester, CEO at Silxo, says it’s time they changed their eating habits – for a diet that’s easier on the corporate digestion, pocket and long-term health prospects.

ROMI: Robotics for Microfarming

Developing technology towards sustainable farming practices: Learn about a new generation of farmers are starting small innovative market gardens in rural, peri-urban and urban areas across Europe.

The importance of cybersecurity: Protecting against cyber-attacks

Thorsten Stremlau, Trusted Computing Group’s Marketing Work Group Co-Chair, highlights the importance of cybersecurity, as well as the risks of cyber-attacks and how best to protect against them.

Transformation as a catalyst for application consolidation

Rob Fotheringham, Managing Director at Fotheringham Associates, highlights the opportunities available for organisations to simplify their technology landscape through application consolidation.

Interactive robotics and understanding these advanced machines

Dr Juan C. Moreno, Director of the Neural Rehabilitation Group at Cajal Institute and Coordinator of the EU INBOTS CSA, lifts the lid on the field of interactive robotics and promoting an understanding and acceptance of these advanced machines.

A cybersecurity and computer science initiative for students to “Code Their Dreams”

In this piece by Marsali Hancock from EP3 Foundation, we learn how a mum launched cybersecurity and computer science initiative reaching over 13 million students. The firm teaches children and college students that they can “Code Their Dreams”.

Developing tools to meet the ethical challenges of connected technologies

Irina Shklovski, Associate Professor at IT University of Copenhagen in Denmark, discusses the importance of developing tools to meet the ethical challenges of connected technologies for a better digital future.

Decentralised cybersecurity: Building the foundations for high-quality data

Steven Sprague, Co-founder and CEO of Rivetz, shares his thoughts on the importance of data with evidence as key to digital transformation.

Document management in education: Crucial for education

Miss Robyn Boyd, PR & Social Media Executive at PFU (EMEA) Limited – a Fujitsu company, lifts the lid on document management (storing information digitally) and why this is crucial in the education sector.

Hacking back: The dangers of offensive cyber security

Morey Haber, Chief Technology Officer, Chief Information Security Officer, BeyondTrust highlights the dangers of hacking back against cyber criminals.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders