HomeOpen Access NewsCyber Security

Cyber Security

CAF Version 4.0 has been released to improve the UK’s infrastructure cyber defence

The National Cyber Security Centre (NCSC) has launched Version 4.0 of its Cyber Assessment Framework (CAF), which is an important step forward in protecting the UK’s national infrastructure (CN) against the cyber threat landscape.

Highlights from day two of Information Security Europe 2019

It was a full house for the opening keynote of Day 2 at Information Security Europe 2019 – Europe’s number one information security event.

Highlights from day one of Infosecurity Europe

Renowned broadcaster Kate Adie delivers keynote speech on day one of the Infosecurity Europe conference programme: Cybersecurity 4.0: Complexity, Risk & Resilience.

National Cyber Security Centre to discuss vision for UK cybersecurity defence

Infosecurity Europe is proud to announce that it shall once again bring the National Cyber Security Centre (NCSC) to the keynote stage to discuss ‘Defending the UK: The NCSC Vision for a more Secure UK’.

Adults fear new porn ban will put them at risk of identity theft

The fear of identity theft when entering personal details online is of paramount concern for UK adults, according to research conducted ahead of the new government porn ban.

UK and Ghana sign strategic partnership agreement

UK and Ghana sign strategic partnership agreement on economic development, regional security, health, education and inclusion.

UK PM joins ‘Christchurch Call to Action’ on online terror

PM Theresa May joins world leaders and internet companies for a Summit on tackling terrorist use of the internet and online terror consequences.

Israel gives ‘Pegasus’ spyware to countries like Saudi Arabia

Israel sells 'Pegasus' spyware that tracks all online moves of an individual to countries like Saudi Arabia and UAE: Amnesty and New York University are filing a petition in Tel Aviv tomorrow (14 May).

Homes under the Hacker: Millions risk personal data being stolen

Research reveals that millions of homeowners are at risk of their personal data being stolen, here we highlight the ways in which criminals target personal details.

The Network and Information Systems (NIS) regulations one year on

Nicola Aspinall, Project and Programme Management (P3M) Consultant at Atkins, outlines the changes businesses have had to make to meet the new Network and Information Systems (NIS) regulations and suggests what more needs to be achieved in the future.

5G: The potential to transform public services in a smart city

Whilst 5G is discussed in the same breath as national security and Theresa May's decision-making, Iain Shearman discusses using 5G networks to support smart cities.

European Commission works on ethics of AI use

The Commission presents the next steps for building trust in artificial intelligence by taking forward the work of the High-Level Expert Group aka the ethics of AI use.

Cyberattacks are putting lives at risk

Karl Lankford, for BeyondTrust, explores previous attacks to industry and draws on findings from an access threat report: Cyberattacks are putting lives at risk via administrative back doors left open.

A home-invasion: The clandestine motives behind IP address targeting

Most are aware that as our time spent online has increased, so has companies’ access to our personal data: What is the truth behind IP address targeting?

How can schools and universities ensure their students’ data is safe online?

Justin Ellis, Senior Data Centre Specialist at Comms Express advises how schools and universities can ensure that their students' data is safe online by following these measures.

Helping government bring IT back in-house

OGEL IT discuss the services they provide to help the government bring IT back in-house, in this report.

How to get a job in cyber security

In this article, cyber security expert Damon Culbert outlines the current state of the industry and explains how you can get a job in cyber security.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders