Home Tags Security

Security Related Content

Fax machines

Fax machines must be eradicated across the public sector

Scott Wilson, director of service at eFax, explains why fax machines are still being widely used, the problems it causes and how they can be eradicated from both public and private sector organisations.
strengthening password security

World Password Day: Strengthening password security

In recognition of this year's World Password Day, five cybersecurity experts have shared their advice for strengthening password security.
isolationist world, data privacy

Data privacy in an isolationist world

As political and security landscapes evolve, the way data privacy is upheld will change significantly. Here, Rachel Roumeliotis, Strategic Content Director at O’Reilly, explores how organisations can stay protected in an isolationist world.

COVID-19 heroes: Who are the workers protecting our country?

It is time to get familiar with the COVID-19 heroes who are not doctors or nurses: Who else is risking their health for the community?
data centres, fire safety

Fire in data centres: Smoke is the biggest cause of damage

Derek Killaspy, Managing Director of Fireworks Ltd, explores why data centres are moving to high pressure water mist fire suppression systems.
healthcare security

Overcoming the complexities of healthcare security

Matt Walmsley, EMEA Director at Vectra, discusses how security teams within the healthcare industry lack visibility into and control over medical devices connected to the network.
queues at airports

The challenges of data security and queues at airports

Irra Ariella Khi, CEO of Zamna, discusses why data security challenges are causing queues at airports and what can be done to solve this.
Reframing the border

Reframing the border as a continuum

Ray Batt, Director, Border Security Programmes Europe, Unisys, offers commentary on reframing the border and the future of trading.
digital security services

Digital security services: Supporting digital IT migration programmes

EHJ & SJ Consultancy, detail the range of Digital Security Services they offer, such as IT migration programmes involving data centres and Cloud environments.

Why fingerprint biometrics is the future of IT security

David Orme, Senior Vice President at IDEX Biometrics ASA, explores the future of IT security using fingerprint biometrics to manage access to not only corporate networks but smart workspaces and buildings.
the borders

Turning data into actionable insight at the borders

As globalisation accelerates, our borders are becoming more difficult to manage. Here Ray Batt, Director, Border Security Programmes Europe, Unisys explores how we need to assess risk at the borders and how we trade in future.
supply chain for data

Data with evidence: Building the supply chain for data

Steven Sprague, Cofounder and CEO of Rivetz shares his thoughts on the importance of protecting the supply chain of data, ensuring all transactions are purposeful, intended and compliant.
role of automation

Threat intelligence and the role of automation in improving security

Chris O’Brien, Director Intelligence Collaboration at EclecticIQ discusses how important it is for analysts to remember that, just because we can automate the process, doesn’t mean it isn’t worth learning, as well as the role of automation on the future.
advanced cyber-attacks

Effective response and mitigation of advanced cyber-attacks via an intelligent cyber-defence framework

Dr Nicholas Kolokotronis from the University of Peloponnese and Dr Stavros Shiaeles, School of Computing, Faculty of Technology at the University of Portsmouth, impart their expert thoughts on effective response and mitigation of advanced cyber-attacks via an intelligent cyber–defence framework.
financial crime

Blockchain: The fight against financial crime

Dave Elzas, CEO, Geneva Management Group discusses the role of blockchain in the fight against financial crime: could it prevent another Bernie Madoff, who pled guilty to the largest Ponzi scheme in world history?.

How can video analysis facilitate investigation of criminal and terrorist activities?

VICTORIA (VIDEO ANALYSIS FOR INVESTIGATION OF CRIMINAL AND TERRORIST ACTIVITIES) is a Horizon 2020 EU Security Project, which is developing robust and accurate video analysis technology to boost the law enforcement agencies’ investigative capacity.
regional security

Environmental approaches to regional security

Juri Martin from EuroAcademy offers his expert thoughts on environmental approaches to regional security
user identity

Digital security means managing user identity

While digitalisation has many benefits, it significantly raises an organisation’s security risk by increasing the number of data exit points. Neville Armstrong, Service Strategist at Fordway, explains why user identity has become the new security perimeter.
crime in prison

£100 million crackdown on crime in prison

Prison security will be boosted by a £100 million investment as part of a crackdown on crime in prison, the government announced today.
drone regulation

Sharing the skies: Drone regulation and security

Florent Abat, Drones & IoT Director, Gemalto, explores the challenges around drone regulation and provides an insight into how we can create a standardised, integrated and seamless way of managing the skies of the future.

Follow Open Access Government