
Keeping safe online in 2025
As cyber threats evolve, staying safe online in 2025 requires strong passwords, multi-factor authentication, and regular software updates to protect against phishing, malware, and ransomware attacks.
As cyber threats evolve, staying safe online in 2025 requires strong passwords, multi-factor authentication, and regular software updates to protect against phishing, malware, and ransomware attacks.
Skipping penetration testing can lead to catastrophic financial, reputational, and operational costs. Investing in prevention is far cheaper and more effective than recovering from a breach.
AI can help alleviate cybersecurity alert fatigue by correlating events, qualifying threats, and reducing stress for analysts, improving well-being and addressing the skills gap in SOCs.
Online multiplayer games can expose personal data to security risks. Learn how to protect yourself by using VPNs, strong passwords, and privacy controls for safer gaming.
With cyber threats constantly evolving, protecting sensitive data is critical for businesses of all sizes. Hiring a Cybersecurity Consultant can
Advancements in technology, such as generative AI and chatbots, have led to more sophisticated cyber threats. As a result, companies are increasing their investments in cybersecurity to protect operations, reputations, and finances.
Zero Trust Network Access (ZTNA) demands constant verification, posing challenges in legacy system adaptation and user experience. Solutions such as MFA and micro-segmentation mitigate risks.
Protecting critical infrastructure requires comprehensive cybersecurity strategies, encompassing threat awareness, employee training, IoT security, emergency protocols, and regular audits to mitigate evolving cyber threats.
As 1.5bn people head to the polls in 2024, Gartner explores the impact of AI on identity verification and calls for proactive measures in the fight against deepfakes.
Constructing a technologically capable and cyber-aware team starts from the top, requiring understanding of security weaknesses and gaps.
Yubico’s John Gilbert on how hardware authentication keys can help protect vulnerable populations, and secure human rights.
CrowdStrike’s Zeki Turedi on the UK government’s cybersecurity strategy.
Citrix’s Gerard Lavin on how to make more sustainable technology choices
Cloudera Fast Forward Labs’ Ade Adewunmi talks about why data rights for children should be at the top of the agenda
W. Curtis Preston, a.k.a “Mr Backup”, on protecting your company’s data against natural disasters
Inderpal Bhandari, Global Chief Data Officer of IBM, outlines the key elements needed for AI to become “trusted”
Aleksandras Šulženko, Product Owner at Oxylabs, writes for Tech For Good
Struggling with cybercrime? M.K. Palmore from Palo Alto Networks highlights the potential of public-private partnerships
Neo4j’s Amy Hodler discusses why graph data analytics is essential to tackle the misappropriation of crisis funds and loans
Thames Valley Police’s digital transformation programme has a pioneering approach to automation, focused on frontline policing rather than back-office tasks. The results are remarkable.
Harrow Council’s IT team take Tech For Good behind the scenes of a digital transformation programme that is improving the lives of its workers and residents.
Ashish Prashar’s journey from youth offender to the Prime Minister’s press secretary and CMO at RG/A demonstrates the importance second-chance hiring.
The UK government is turning to smaller companies to run its services. We explore with AWS’s Chris Hayman
Sarwar Kahn, Sustainability Director (Business) at telco giant BT, on the company’s moves to net-zero and how to embed sustainability into cloud operations.
Consultant Hannah Cox tells us how businesses serious about creating a sustainable future can get B Corp certified
Janina Nakladal is Global Director of Sustainability for Celonis.
In this podcast, Janina discusses the power of process mining and the challenges of achieving sustainability transformation.
Al Kingsley is CEO of edtech company NetSupport, and an influential voice on the topics of education and technology in the UK. In this podcast, Al discusses using tech in the right way as teachers and children adapt to the new normal.
As cyber threats evolve, staying safe online in 2025 requires strong passwords, multi-factor authentication, and regular software updates to protect against phishing, malware, and ransomware attacks.
Skipping penetration testing can lead to catastrophic financial, reputational, and operational costs. Investing in prevention is far cheaper and more effective than recovering from a breach.
AI can help alleviate cybersecurity alert fatigue by correlating events, qualifying threats, and reducing stress for analysts, improving well-being and addressing the skills gap in SOCs.
Online multiplayer games can expose personal data to security risks. Learn how to protect yourself by using VPNs, strong passwords, and privacy controls for safer gaming.
With cyber threats constantly evolving, protecting sensitive data is critical for businesses of all sizes. Hiring a Cybersecurity Consultant can
Advancements in technology, such as generative AI and chatbots, have led to more sophisticated cyber threats. As a result, companies are increasing their investments in cybersecurity to protect operations, reputations, and finances.
Zero Trust Network Access (ZTNA) demands constant verification, posing challenges in legacy system adaptation and user experience. Solutions such as MFA and micro-segmentation mitigate risks.
Protecting critical infrastructure requires comprehensive cybersecurity strategies, encompassing threat awareness, employee training, IoT security, emergency protocols, and regular audits to mitigate evolving cyber threats.
As 1.5bn people head to the polls in 2024, Gartner explores the impact of AI on identity verification and calls for proactive measures in the fight against deepfakes.
Constructing a technologically capable and cyber-aware team starts from the top, requiring understanding of security weaknesses and gaps.
Yubico’s John Gilbert on how hardware authentication keys can help protect vulnerable populations, and secure human rights.
CrowdStrike’s Zeki Turedi on the UK government’s cybersecurity strategy.
Citrix’s Gerard Lavin on how to make more sustainable technology choices
Cloudera Fast Forward Labs’ Ade Adewunmi talks about why data rights for children should be at the top of the agenda
W. Curtis Preston, a.k.a “Mr Backup”, on protecting your company’s data against natural disasters
Inderpal Bhandari, Global Chief Data Officer of IBM, outlines the key elements needed for AI to become “trusted”
Aleksandras Šulženko, Product Owner at Oxylabs, writes for Tech For Good
Struggling with cybercrime? M.K. Palmore from Palo Alto Networks highlights the potential of public-private partnerships
Neo4j’s Amy Hodler discusses why graph data analytics is essential to tackle the misappropriation of crisis funds and loans