HomeOpen Access NewsCyber Security

Cyber Security

UK strengthens cyber defences as new legislation and industry growth gather pace

The UK government has closed 2025 with major developments in cyber security policy, skills and industry engagement, highlighted by the introduction of the Cyber Security and Resilience Bill and new evidence on the economic impact of cyber attacks.

UK and Ghana sign strategic partnership agreement

UK and Ghana sign strategic partnership agreement on economic development, regional security, health, education and inclusion.

UK PM joins ‘Christchurch Call to Action’ on online terror

PM Theresa May joins world leaders and internet companies for a Summit on tackling terrorist use of the internet and online terror consequences.

Israel gives ‘Pegasus’ spyware to countries like Saudi Arabia

Israel sells 'Pegasus' spyware that tracks all online moves of an individual to countries like Saudi Arabia and UAE: Amnesty and New York University are filing a petition in Tel Aviv tomorrow (14 May).

Homes under the Hacker: Millions risk personal data being stolen

Research reveals that millions of homeowners are at risk of their personal data being stolen, here we highlight the ways in which criminals target personal details.

The Network and Information Systems (NIS) regulations one year on

Nicola Aspinall, Project and Programme Management (P3M) Consultant at Atkins, outlines the changes businesses have had to make to meet the new Network and Information Systems (NIS) regulations and suggests what more needs to be achieved in the future.

5G: The potential to transform public services in a smart city

Whilst 5G is discussed in the same breath as national security and Theresa May's decision-making, Iain Shearman discusses using 5G networks to support smart cities.

European Commission works on ethics of AI use

The Commission presents the next steps for building trust in artificial intelligence by taking forward the work of the High-Level Expert Group aka the ethics of AI use.

Cyberattacks are putting lives at risk

Karl Lankford, for BeyondTrust, explores previous attacks to industry and draws on findings from an access threat report: Cyberattacks are putting lives at risk via administrative back doors left open.

A home-invasion: The clandestine motives behind IP address targeting

Most are aware that as our time spent online has increased, so has companies’ access to our personal data: What is the truth behind IP address targeting?

How can schools and universities ensure their students’ data is safe online?

Justin Ellis, Senior Data Centre Specialist at Comms Express advises how schools and universities can ensure that their students' data is safe online by following these measures.

Helping government bring IT back in-house

OGEL IT discuss the services they provide to help the government bring IT back in-house, in this report.

How to get a job in cyber security

In this article, cyber security expert Damon Culbert outlines the current state of the industry and explains how you can get a job in cyber security.

10 reasons to become an ethical hacker

In this article, Damon Culbert explains how ethical hackers are cybersecurity experts who go head to head with cybercriminals: read his reasons why you should become an ethical hacker.

Blockchain-based identity: A tool for global innovation

Following a year of widespread data breaches and the ongoing threat to online data, it’s no surprise that digital identity has evolved as one of the most important issues facing organisations and consumers on a global scale.

How can banks prevent identity fraud?

Tim Bedard, Director, OneSpan, provides his advice on how banks can prevent identity fraud and gain the upper hand during a time of increased cyber attacks.

Businesses stuck in reactive mentality on cybersecurity

IT decision makers could be stuck in a reactive mentality on cybersecurity as they are facing major challenges between dynamic adversaries, significant legislation and regulation requirements.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders