Home Tags Cyber Security

Cyber Security Related Content

end-user device

Maintaining an up-to-date well-patched end-user device environment

Maintaining an up-to-date end-user device environment has been a challenge for many, but it does not need to be, Sam Newman, Technical Director of OGEL IT LTD explains.
pandemic response

Drawing parallels between pandemic response and cybersecurity

As cybersecurity experts begin to adapt to remote working, it is worth noting that there are strong parallels between a pandemic response and handling cybersecurity threats. Here, Raymond Pompon, Director of F5 Labs, explains why.
issue of cybersecurity

The issue of cybersecurity when taking work to the home

Ben Bulpett, EMEA Director, SailPoint, discusses how Coronavirus is forcing the issue of cybersecurity during the ‘flexible working revolution’
importance of Swindon and Wiltshire

Constant reinvention: The strategic locational importance of Swindon and Wiltshire

Paddy Bradley, Director of Swindon and Wiltshire Local Enterprise Partnership, underlines the strategic locational importance of Swindon and Wiltshire in the UK.
complex cyber-attacks

SOCCRATES: Improving detection and response to complex cyber-attacks 

The Horizon 2020 project SOCCRATES brings together some of the best expertise in the field to develop, implement and evaluate an automated security platform to defend against complex cyber-attacks, more of which is explained here by Reinder Wolthuis from TNO.
Cyber Security Services 3 dynamic purchasing system

CCS launches its Cyber Security Services 3 dynamic purchasing system

Crown Commercial Service (CCS) has announced the launch of its new Cyber Security Services 3 dynamic purchasing system (DPS).
global situation for women, international women's day

International Women’s Day: UN review the global situation for women

Let’s discuss the UN Women report, “Women’s Rights in Review 25 years after Beijing,” which documents how gender equality is functioning on International Women's Day.
human firewall

Human firewall: How businesses can mitigate against cyber attacks

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how businesses protect themselves against cyber attacks by building a human firewall.
mobile phishing

Defending against mobile phishing attacks: How the government can set an example

Tom Davison, Technical Director International at Lookout, discusses the issue of mobile phishing within the government sector and how it can protect employees inside and outside of the workplace.
smarter cyber security

Smarter cyber security must underpin Europe’s digital future

Alyn Hockey, VP of Product Management at IT security firm, Clearswift, discusses why effective and smarter cyber security has to underpin Europe’s digital future.
cyber tips

Top cyber tips for every personality and organisation

John Hackston, Head of Thought Leadership at The Myers-Briggs Company, offers a series of cyber tips and advice aimed at different personality types about their potential cyber security weaknesses.
cyber secure

Growing up ‘tech savvy’ doesn’t make employees more cyber secure

Azeem Aleem, Vice President Cybersecurity Consulting, NTT Ltd, discusses how a new generation of employees is bringing new attitudes towards being cyber secure.
internet commons

Cybersecurity and the tragedy of internet commons

Elisabetta Zaccaria, Strategic Advisor to Secure Chorus, discusses how we may be facing a tragedy of the internet commons problem. Is the way forward to revert to government-mandated regulation instead of market self-regulation to address global cybersecurity risks?.
personal cybersecurity, signal

European Commission: Personal cybersecurity via encrypted messaging

Signal is the messaging app that claims the highest level of personal cybersecurity: Why has the European Commission chosen this over other platforms?
coronavirus news

Cybercriminals take advantage of coronavirus news

Avishay Zawaoznik, Security Research Manager at Imperva, describes the types of spam campaigns designed to spread fake news and the dangers they pose on our understanding of coronavirus.
laws on Artificial intelligence, OCR technology

Can we realistically create laws on artificial intelligence?

Chris Rourk, Partner at Jackson Walker, a member of Globalaw, talks us through the realities of attempting to create laws on artificial intelligence.
healthcare security

Overcoming the complexities of healthcare security

Matt Walmsley, EMEA Director at Vectra, discusses how security teams within the healthcare industry lack visibility into and control over medical devices connected to the network.
safeguarding children

Safer Internet Day: Safeguarding children beyond the classroom

Simon Carter, Marketing and Propositions Director at RM Education, offers advice on how teachers and parents can safeguard children when using the internet.
Together for a better internet

Safer Internet Day: Together for a better internet

To celebrate this year's Safer Internet Day, several industry experts offer their advice to Open Access Government in support of the ‘together for a better internet’ theme.
what we read online, cambridge analytica

Our actions decide what we read online, algorithms are only a part of it

In light of scandals like Cambridge Analytica, Tor Richardson Golinski, Amelia Harshfield and Advait Deshpande dissect the truths of who decides what we read online.

Follow Open Access Government