Once a year, maybe twice if they’re cautious, businesses invite a third party to find holes in their defences, patch a few, file the PDF report, and move on. The assumption is that the security picture stays the same, but it doesn’t, not even close.
The recent ransomware attack on Leicester City Council is a stern reminder of how vulnerable UK local councils are to increasing cyber threats. How should local councils defend themselves?
The UK government has called out China's state-affiliated actors for engaging in cyber activities aimed at damaging UK democratic institutions and individuals.
Open Access Government charts the priorities of the European Commission’s Directorate‑General for Communications Networks, Content and Technology about carrying out and developing the policies that enable a thriving European digital age.
When it comes to cybersecurity, the public sector is renowned for being severely underfunded, leaving it limited with the resources it can depend on. To make matters worse, there is a lack of available security talent to fill an ever-growing list of positions.
As the legal sector undergoes a digital transformation, law firms grapple with cybersecurity challenges, prompting a shift towards third-party payment providers.
Learn why Mobile Device Management security is crucial for government organizations, ensuring strong protection and smooth device operations. Find out why it matters and get crucial insights for a secure mobile device setup.
Crown Workforce Management’s Managing Director, Mike Hawkesford, argues that Cloud technology is more secure and efficient than on-premise and hosted servers.
In the King’s Speech, we saw announcements of long-term strategies to meet deficits in healthcare training, much-needed investment in mental health services and encouragement in engagement in innovative technologies, but what about policing and public safety?
In a development at the UK National Quantum Technologies Showcase, Science Minister George Freeman is set to unveil a significant boost for the nation's burgeoning quantum strategy with over £14 million in funding.
Australian researchers have unveiled a groundbreaking cyber algorithm designed to thwart man-in-the-middle (MitM) attacks on unmanned military robots, ensuring rapid shutdown in seconds.
Marc Hoogstad, Head of Product Management at Finworks, discusses how real-time data can support government decision-making and the benefits of establishing coordinated and robust data management practices
Chief Technology Officer at Zama Dr. Pascal Paillier talks to Open Access Government about why privacy in healthcare matters, the barriers to privacy faced by the industry and how Fully Homomorphic Encryption (FHE) could help.
The rise of smart technology in the UK has led to more cyberattacks, so organisations need strong, adaptable cybersecurity plans, as shown by the Capita incident, with a focus on risk assessment, employee training, and cyber insurance.
The rapidly evolving digital landscape has rendered cybersecurity measures such as firewalls and encryption inadequate when used in isolation.
Threat actors are outpacing these defences...