Meeting the highest standards of end-to-end encryption to defend your data
Data is arguably an organisation’s biggest asset, which makes it a key target for cybercriminals. With 26 per cent of
Read moreData is arguably an organisation’s biggest asset, which makes it a key target for cybercriminals. With 26 per cent of
Read moreAbstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties
Read moreOctober marks the commencement of Cybersecurity Awareness Month, a global initiative aimed at fostering a safer digital landscape. As we
Read moreThere have been concerted efforts to encourage people to enter the cybersecurity profession. Back in February, the UK Cyber Security
Read morePMRExpo 2023 – the leading European trade fair for Secure Communications will start in Cologne on 28 November. PMRExpo has been taking
Read moreAbstract: Wireless mesh networks have recently presented a promising environment for many researchers to develop large-scale wireless communication. Traffic in
Read moreA recent article in Bleeping Computer detailed a new cyber attack technique developed by researchers in the UK that uses
Read moreAbstract: Domain Name System (DNS) is considered a vital service for the internet and network operations, and practically this service is
Read moreCybercriminals are notoriously good at the art of uncovering the paths of least resistance that lead to an organisation’s valuable
Read moreIn this podcast episode, Philippa Jefferies is joined by Alex Leadbeater, Chair of ETSI TC Cyber, David Boswarthick, Director of
Read more