HomeOpen Access NewsCyber Security

Cyber Security

Continuous penetration testing

Once a year, maybe twice if they’re cautious, businesses invite a third party to find holes in their defences, patch a few, file the PDF report, and move on. The assumption is that the security picture stays the same, but it doesn’t, not even close.

The Network and Information Systems (NIS) regulations one year on

Nicola Aspinall, Project and Programme Management (P3M) Consultant at Atkins, outlines the changes businesses have had to make to meet the new Network and Information Systems (NIS) regulations and suggests what more needs to be achieved in the future.

5G: The potential to transform public services in a smart city

Whilst 5G is discussed in the same breath as national security and Theresa May's decision-making, Iain Shearman discusses using 5G networks to support smart cities.

European Commission works on ethics of AI use

The Commission presents the next steps for building trust in artificial intelligence by taking forward the work of the High-Level Expert Group aka the ethics of AI use.

Cyberattacks are putting lives at risk

Karl Lankford, for BeyondTrust, explores previous attacks to industry and draws on findings from an access threat report: Cyberattacks are putting lives at risk via administrative back doors left open.

A home-invasion: The clandestine motives behind IP address targeting

Most are aware that as our time spent online has increased, so has companies’ access to our personal data: What is the truth behind IP address targeting?

How can schools and universities ensure their students’ data is safe online?

Justin Ellis, Senior Data Centre Specialist at Comms Express advises how schools and universities can ensure that their students' data is safe online by following these measures.

Helping government bring IT back in-house

OGEL IT discuss the services they provide to help the government bring IT back in-house, in this report.

How to get a job in cyber security

In this article, cyber security expert Damon Culbert outlines the current state of the industry and explains how you can get a job in cyber security.

10 reasons to become an ethical hacker

In this article, Damon Culbert explains how ethical hackers are cybersecurity experts who go head to head with cybercriminals: read his reasons why you should become an ethical hacker.

Blockchain-based identity: A tool for global innovation

Following a year of widespread data breaches and the ongoing threat to online data, it’s no surprise that digital identity has evolved as one of the most important issues facing organisations and consumers on a global scale.

How can banks prevent identity fraud?

Tim Bedard, Director, OneSpan, provides his advice on how banks can prevent identity fraud and gain the upper hand during a time of increased cyber attacks.

Businesses stuck in reactive mentality on cybersecurity

IT decision makers could be stuck in a reactive mentality on cybersecurity as they are facing major challenges between dynamic adversaries, significant legislation and regulation requirements.

5 ways cyber security in 2019 is changing and what to expect

After a whirlwind 2018, cyber security in 2019 isn't looking like an easy ride but here, Sam Bocetta, retired security analyst, provides insight into what to expect and how to prepare against possible attacks.

NHS email system needs to be more resilient

Gareth Lewis discusses how the NHS email system underpins communication between doctors, nurses and health professionals across the country every day, so what happens when it fails?

The role of biometrics in healthcare

David Orme, SVP of IDEX Biometrics, elaborates on how the role of Biometrics in healthcare can elevate clinical standards, protect staff and patients, and combat fraud.

Cybersecurity expert discusses changing world of cybercrime

Speaking to Open Access Government, cybersecurity expert and Vice President of InsideSecure, Asaf Ashekenazi discusses with us the changing world of cybercrime.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders