CybersecurityNews - Page 6

Sharing is caring: How the Shared Responsibility Model puts data in a safe pair of hands

Learn more about how the Shared Responsibility Model can protect businesses and clients from harmful data breaches.

Human misconceptions of risk: The blocker to password evolution

Learn how human misconceptions in the cybersecurity industry prevent the evolution from passwords to new authentication systems.

Zero Trust Authentication: 7 key principles of the new security concept

Zero Trust Authentication seeks to revolutionise how we think about the relationship between authentication and security.

How should businesses avoid a ransomware attack?

NetApp's Andy Wood outlines how businesses can make better choices when it comes to staying protected from a ransomware attack.

Quantum randomness: Why it’s essential for securing the connected future

Discover more about the importance of quantum randomness and QRNGs in maintaining essential cybersecurity safety systems.

Funding awarded to help small businesses improve cyber security

Experts from the University of Nottingham have been awarded funding to help businesses understand and improve their cyber security.

The 3 limitations of AI-driven cyber attacks

Richard Ford, CTO of Integrity360, debunks the myths surrounding AI-driven cyber attacks and outlines their three limitations.

Preparing for the rise of quantum computing in identity and cybersecurity

Learn more about the steps governments and organisations are taking in anticipation of the rise of quantum computing.

Can Red Teams safeguard cloud migration?

Learn more about how investments in Red Teams are essential to help secure cloud migration for organisations.

How to protect UK organisations from cyber attacks and data breaches

Learn how UK businesses can protect themselves against cyber attacks by updating authentication methods and cyber hygiene practises.

Quantum computing of the near future: Overcoming society’s most profound challenges

Learn more about how developments in quantum computing of the near future can solve significant challenges across several industries.

Artificial Intelligence: A tool for assault or defence?

Learn about the concerns regarding Artificial Intelligence and find out how AI can actually be used to mitigate these challenges.

How to create an effective ICS/OT incident response plan

Discover the three most important points when formulating an incident response plan for industrial cyber attacks. 

First Digital Partnership council held by the EU and the Republic of Korea

The European Union and the Republic of Korea held the first Digital Partnership council in Seoul, the Republic of Korea.

What are the cybersecurity pitfalls when trying to protect remote workers?

Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats. 

How can hackers gain access to air-gapped computers?

Discover how recent advancements in quantum computing may be dangerous and pave the way for attacks on air-gapped computers.

How can we protect critical national infrastructure from cyber attacks?

Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.

AI cannot replace human input when it comes to defeating cybercriminals

Find out how a combination of Artificial Intelligence and human input is required to mitigate against cybersecurity threats. 

How the UK’s £1bn National Semiconductor Strategy will elevate the sector

Read how the UK's £1bn National Semiconductor Strategy will advance the country’s semiconductor production capabilities.

DDoS attacks: How are threat actors developing more innovative attacks?

Discover how a huge surge in the number of new, innovative DDoS attacks poses a major threat to cyber security.

Innovation News Network - Free Digital eBook Library

Innovation News Network - Global Innovation Partners

Special Reports

Partner News

Special Reports Cont'd

Partner News Cont'd