Grid List

Results: 42 items

How is identity data creating headaches for large companies? article icon

Money & Business

How is identity data creating headaches for large companies?

Increasingly the costs and risks of holding data are turning toxic for businesses. Bhargav Mitra and Robert McCausland explain why.

Article
5 mins
Can we overcome cyber-fatigue to secure ourselves online? article icon

Digital & Computing

Can we overcome cyber-fatigue to secure ourselves online?

Richard Forno says focusing on short-term fixes might make us too exhausted to shape a long term solution to the challenges of cybersecurity.

Article
5 mins
Information security free course icon level 3: advanced icon

Science, Maths & Technology

Information security

Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organisations. This free course begins by explaining why information security and its management are important for any modern organisation and to every individual. You need to be familiar with an ...

Free course
10 hrs
Network security free course icon level 3: advanced icon

Digital & Computing

Network security

Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a ...

Free course
25 hrs
How can governments ensure their cybersecurity is strong? article icon

Digital & Computing

How can governments ensure their cybersecurity is strong?

The state government of Michigan has adopted a response to potential digital attacks that provide a useful model, explains Brian Nussbaum.

Article
5 mins
How to Survive a Botnet Attack video icon

Science, Maths & Technology

How to Survive a Botnet Attack

Have you ever clicked on a link you were unsure of, or downloaded a risky attachment? If so, then you are in danger of becoming part of a Botnet, also known as a ‘zombie army'. The term ‘zombie army’ is used to refer to a number of computer networks that have become infected as a result of malicious third party software sneaking onto a user’s ...

Video
3 mins