Home Search
cyber threat - search results
If you're not happy with the results, please do another search
The rise of “deepfake” technology: Where does it end?
Here, James A. Ingram dives into an ongoing topic of intrigue in modern society: The rise of deepfake technology.
NHS Internet First policy: What does your organisation need to consider?
Ian Wilcox, Director of Health Sector Business Development at MLL Telecom, discusses what health and social care organisations need to consider following the announcement of the new Internet First policy.
Securing your data in the cloud: All you need to know
David Blevosky, CEO of Cloudhelix, highlights how securing your data in the cloud is straightforward and can protect your business against any expense and reputation damage caused by cyber crime.
44% of UK crime investigations are dropped
Tim Kiely, Barrister at Red Lion Chambers, responds to the news that 44% of UK crime investigations are dropped without being fully explored.
Data protection in the healthcare sector
Data protection in the healthcare sector is an increasing cybersecurity concern: What will happen next in the regulation of this industry?
Digital security services: Supporting digital IT migration programmes
EHJ & SJ Consultancy, detail the range of Digital Security Services they offer, such as IT migration programmes involving data centres and Cloud environments.
Why fingerprint biometrics is the future of IT security
David Orme, Senior Vice President at IDEX Biometrics ASA, explores the future of IT security using fingerprint biometrics to manage access to not only corporate networks but smart workspaces and buildings.
Why updated software remains critical to the NHS
Chris Mountford, account director and head of public sector at Stone Group, highlights the critical importance of NHS providers updating their software to Windows 10 as recent research found that three-quarters of trusts were still using Windows 7.
The human cost of disruption on health and well-being at work
Here, John Young, VP at Sungard AS, discusses health and well-being in a place where stress and immense pressure is normal.
Why are the politics pages key to technology leaders?
Etienne Greeff, CTO and co-founder of SecureData, discusses why the tech pages are not the most important part of a newspaper for technology leaders and why the politics pages are.
The Lancaster University data breach: Safeguarding students personal information
Organisations like universities that handle significant amounts of confidential and personal information are increasingly being targeted by cyber criminals. In this article SecureTeam looks at the damage data breaches are causing in UK universities.
The government’s relationship with commercial suppliers: A focus on prompt payments
Simon Hart MP, Minister for Implementation at the Cabinet Office in the UK, underlines an aspect of his brief that concerns managing the government’s relationship with our commercial suppliers, with a focus on the importance of prompt payments.
Keeping our democracy true: Foreign information interference and forward-looking countermeasures
Vassilis Ntousas from the Foundation for European Progressive Studies explores an aspect of politics that concerns keeping our democracy true when it comes to foreign information interference and forward-looking countermeasures.
Why trust at face value can’t fix the civil service email leaks
Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.
Why must the public sector take a security by design approach?
Cybersecurity is a high-profile issue for UK public sector bodies, as recent news shows. Iain Shearman, Managing Director of KCOM’s National Network Services, looks at why the public sector needs to adopt security by design.
Enabling secure mobility in the public sector
David Critchley, Regional Director, UK&I, MobileIron, highlights the importance of enabling secure mobility after a Freedom of Information (FoI) request revealed how many mobile and laptop devices had been lost by staff from nine ministerial departments in 2018.
Does your childs school have an unsecure Wi-Fi network?
Back-to-School season: This year, hackers can get inside your kids' classroom as many schools have unsecure Wi-Fi networks that can be easily hacked.
Australia: Overmedication of older people in nursing homes
Australia passed a new rule that allows nursing homes to continue the physical restraint and overmedication of older people.
Fake news: Debunking and defeating deepfake audio
Dr Matthew Aylett delves into the use of deepfake audio; touching on weaponisation and lack of public awareness, whilst reframing the tech as a communication tool for speech-altering diseases.
Preparing for the Cy-Phy future
Cy-Phy could become the next wave of technology and increase cyber security for better business practices, here Phil Quade, CISO, Fortinet highlights why we should begin preparing now.