HomeOpen Access NewsCyber Security

Cyber Security

Continuous penetration testing

Once a year, maybe twice if they’re cautious, businesses invite a third party to find holes in their defences, patch a few, file the PDF report, and move on. The assumption is that the security picture stays the same, but it doesn’t, not even close.

Why the UK’s public sector needs to urgently build better cybersecurity  

Keith Glancey, Head of Solutions Architects at Infoblox, explores why cybersecurity has never been more important for the public sector.

Online Safety Bill poses threats to encryption

Robin Wilton, director for Internet Trust at Internet Society, discusses why governments and the private sector pose threats to encrypted communications.

Stabilization in Physically Unclonable Constants

Prof Riccardo Bernardini from the University of Udine tells us about the importance of stabilization in Physically Unclonable Constants.

The implications of changing compliance trends on the threat landscape

Nic Sarginson, Principal Solutions Engineer at Yubico, discusses the key regulatory changes in the UK & EU and the pressures being placed on regulators/ policymakers to protect the public from the risks associated with this “new normal".

The rise of ransomware within healthcare

David Higgins, EMEA Technical Director, CyberArk, explores three reasons why healthcare organisations are extra vulnerable to ransomware.

Why Cyber and Choice are essential to working from everywhere

Tariq Hussain, Senior Sales Director, UK Government and National Security, Dell Technologies, explores Why Cyber and Choice are essential for hybrid working.

Closing the endpoint security gap within government

Tom Lysemose Hansen, CTO of Promon, discusses the importance of securing endpoints for government organisations.

Why organisations need to address data management

Chris Hyde, Global Head of Data Solutions at Validity, discusses how businesses can attain quality data to help further boost e-commerce and in-store sales success.

Emerging pedagogy and secured practices for adopting e-learning

Dr Preethi Kesavan, Head of School of Technology at LSBF Singapore, ponders the innovative teaching and learning methodologies that educators must employ when implementing e-learning.

How to protect your healthcare organisation from ransomware attacks

Joe Robertson, EMEA Field CISO at Fortinet, explores how ransomware attacks are increasing in healthcare and what organisations can do to protect themselves.

Proactive measures to secure utilities  

Theresa Lanowitz, director, AT&T Cybersecurity, explores the threat of ransomware against utility companies and how they can protect themselves using an offensive cybersecurity strategy.

5 cybersecurity issues that the public sector faces and how to protect it

Fortinet explores the five top cybersecurity challenges that the public sector is facing and urges those in charge to gain a better understanding of leading cybersecurity technologies and how they work.

How local councils can ensure modern data protection best practices

Dan Middleton, VP, UK&I, shares his top tips on how local councils can ensure best practices when it comes to modern data protection.

Device management is blinding the financial sector to its serious problems

Hank Schless, Senior Manager, Security Solutions at Lookout, explores why device management is blinding the financial sector to its serious problems.

Keeping your business safe from the dangers of hacking when remote working

Mark Brown, Founder of Psybersafe, explores the dangers of hacking when working from home and offers some advice on how to keep your business safe.

Colonial Pipeline: Inherent flaws in the national cybersecurity strategy

Miles Tappin, VP of EMEA at ThreatConnect, explores why the recent Colonial Pipeline ransomware attack has exposed a significant weakness in the US national cybersecurity strategy.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders