HomeOpen Access NewsCyber Security

Cyber Security

UK cyber security a boost through new investments, strategies and standards

Cybersecurity remains a crucial component in the UK's security landscape. With this in mind, the UK government has launched a new wave of government initiatives aimed at strengthening national resilience, building digital skills, and supporting cyber innovation.

Why must the public sector take a security by design approach?

Cybersecurity is a high-profile issue for UK public sector bodies, as recent news shows. Iain Shearman, Managing Director of KCOM’s National Network Services, looks at why the public sector needs to adopt security by design.

Does your childs school have an unsecure Wi-Fi network?

Back-to-School season: This year, hackers can get inside your kids' classroom as many schools have unsecure Wi-Fi networks that can be easily hacked.

Digital security means managing user identity

While digitalisation has many benefits, it significantly raises an organisation’s security risk by increasing the number of data exit points. Neville Armstrong, Service Strategist at Fordway, explains why user identity has become the new security perimeter.

Deal or no deal: Brexit could be good for cyber security

Chris Bush, Head of Security, ObserveIT discusses why Brexit doesn’t actually have to mean a less cyber-secure UK, in this article.

How can you gain consumer trust in the age of digital regulation and cyber attacks?

Lee Parry is CEO and co-founder of Enigma Recovery, shares his top tips for business owners who are looking for new ways to gain consumer trust when cyber security is at the forefront of all our minds.

Fake news: Debunking and defeating deepfake audio

Dr Matthew Aylett delves into the use of deepfake audio; touching on weaponisation and lack of public awareness, whilst reframing the tech as a communication tool for speech-altering diseases.

Preparing for the Cy-Phy future

Cy-Phy could become the next wave of technology and increase cyber security for better business practices, here Phil Quade, CISO, Fortinet highlights why we should begin preparing now.

What porn research for the boy scouts taught me

The Real Risk to Children: Exploited By Commercial Algorithms. How browsing habits can link to pornography and other harmful content for children.

Nearly a quarter of businesses monitor and track employees

As more businesses invest in surveillance technology to monitor and track employees in the workplace, questions are raised around whether the benefits override growing concerns around digital ethics.

Can artificial intelligence beat a human hacker?

Here, the question is asked: Can artificial intelligence measure up to the intuition of a human hacker?

Facebook cryptocurrency: Libra needs to focus on data protection

Facebook’s cryptocurrency, Libra, faces renewed questions from regulatory authorities on how it will protect user data and prevent money-laundering.

What are the cybersecurity challenges facing the healthcare sector?

External and internal attackers are drawn to healthcare sector due to the value of the vast amounts of personal health information (PHI) these organisations manage.

Decentralising security for mobile devices: Is blockchain the viable solution?

Steven Sprague, Cofounder and CEO of Rivetz reveals a viable solution when it comes to decentralising security. He argues that there is great promise for creating mobile device security with blockchain technology.

How have security threats revamped the mobile industry?

Tech geek Devin Smith highlights how the mobile industry has been revamped to counter security threats posed by cyber crime in this article.

How voice biometric technology is transforming modern contact centres

Tim Dunn, Commercial Director at ValidSoft discusses the benefits of deploying voice biometric technology and how it can transform modern call centres.

Utility companies and IoT: Securing the future today

Connected appliances and devices are revolutionising the nation’s homes, but what does this mean for the utility companies responsible for powering them? How can they ensure cyber security in the age of IoT?.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders