Once a year, maybe twice if they’re cautious, businesses invite a third party to find holes in their defences, patch a few, file the PDF report, and move on. The assumption is that the security picture stays the same, but it doesn’t, not even close.
Britain and France’s leading tech sector will be brought closer together with plans for a digital conference to promote deeper integration in the digital...
Erwin Gianchandani and Michal Ziv-El from the National Science Foundation (NSF) provide a fascinating insight into how fundamental computing research is profoundly transforming our...
Simon Kavanagh from Tieto explores the importance of both security and responsibility when it comes to decentralised personal data
Do you remember that café in...
VP and Chief Security Officer, EMEA of Palo Alto Networks, Greg Day shares his cybersecurity predictions for the future. Beyond his work there, Greg...
What challenges and opportunities could the Second Payment Services Directive (PSD2) provide?
The Second Payment Services Directive (PSD2) requires banks to open their payments infrastructure...
Secure Cloudlink's new and unique approach to digital security wins UBS future of finance 2017 challenge
In the annual competition, which seeks out innovations and ideas...
€5 million in prizes will be awarded to innovators that use Blockchain technology for social good
The European Commission has launched a new Horizon 2020...
Patrick Arben, partner at Gowling WLG reveals his thoughts on the ever-prevalent issue of cyber security
Cybersecurity is certainly a digital risk that is ‘of...