Security
UoG to develop improvements in cybersecurity through £275k KTP
University of Gloucestershire has secured a £275k Knowledge Transfer Partnership (KTP) to advance innovation and drive meaningful improvements in cybersecurity.
Staying cyber safe: understanding NIS2
The complexity of today’s connected electrical systems attracts cybersecurity threats to uptime, revenues, and corporate reputation. Jason Newby, Advisory Services Global Portfolio Manager at ABB, outlines what European organisations need to know about the recently enforced NIS2 Directive – and how an experienced partner can help your own business stay compliant.
Sonatype expands enterprise protection against open source malware
Sonatype has introduced major enhancements to Repository Firewall that expand proactive malware protection across the enterprise – from developer workstations to the network Edge. These additions help development, security, and data science teams block known and suspected malicious components early – reducing rework, avoiding security incidents, and consistently enforcing policies across traditional, containerised, and AI/ML...
Crypto Quantique publishes independent analysis on streamlining CRA compliance
Crypto Quantique has published an independent analysis of its QuarkLink end-to-end device security platform. The report was prepared by cetome, an internationally recognised cybersecurity advisory firm that considered seven key areas.
SOMLabs i.MX8Mmini system-on-modules Cyber Resilience Act ready
Inelco Hunter, the UK franchised distributor for SoMLabs, is pleased to announce that the i.MX8Mmini System-on-Modules (SoMs) are “CRA ready” i.e. they conform to the EU Cyber Resilience Act which came into force on 10 December 2024.
How to secure hardware against side-channel attacks
With the growing demand for faster, more connected devices, companies need stronger hardware security than ever. Encryption algorithms and secure protocols protect sensitive data, but lesser-known security threats – like side-channel attacks – can easily bypass these components.
Optimising incident response: why MTTD and MTTR matter more than ever
For many IT professionals, there’s a familiar, unwelcome sound in the middle of the night: the dreaded alert notification. Is it another false alarm or a critical system failure demanding immediate action?
SYSGO and Teledyne e2v for the EAGLE-1 Quantum Security Project
SYSGO has been chosen to supply cutting-edge software technology for the EAGLE-1 project. This innovative mission, led by SES, in collaboration with 20 European partners and supported by the European Space Agency (ESA) and the European Commission (EC), will enable long-distance Quantum Key Distribution (QKD).
Women eye cybersecurity as top tech career
As the world’s reliance on online systems increases, so too does the need for robust cybersecurity to prevent attacks. In just a few past weeks, two major US healthcare providers, as well as the online platform X (formerly Twitter), claimed they were hacked, affecting hundreds of thousands of users.
The UK’s Apple backdoor demand: a cybersecurity disaster in the making
The UK government’s latest demand for Apple to create a backdoor for encrypted iCloud data has ignited a global debate on privacy, security, and the dangers of centralised control.