666 Results for:E-MAIL

  • Sort by: 

25,000 criminal reports: Vastaamo breach sets new precedent

By Arielle Waldman 12 Nov 2020

The recent data breach at the Vastaamo Psychotherapy Centre in Finland shows threat actors are willing to threaten and extort patients directly, setting a dangerous new precedent. Read More

Making sense of the changing UK Cyber Policing and Skills Scene

By Philip Virgo 04 Mar 2021

There is an urgent need to make rapid use of the trusted partner programmes of the new Cyber Resilience Centres to help business of all sizes (and charities, schools, reputable training providers ... Read More

Should companies ask for a SaaS software bill of materials?

By Ed Moyle 07 Apr 2022

Though it isn't commonplace to ask for a SaaS software bill of materials, one can be beneficial for both SaaS providers and their customers. Learn why. Read More

Getting Britain back to work with the Skills of the Future - using Cyber as an example.

By Philip Virgo 26 Jul 2022

Harnessing talent today to deliver the evolving skills of the future on the scale needed requires employers to build on the mass-market channels that already exist, like those of the Careers and ... Read More

Lessons from the Post Office Horizon Case

By Philip Virgo 25 May 2021

The presumption of the machine functioning properly in practice, means that the prosecution can rely on the presumption that a computer was operating reliably at all material times. It needs to be ... Read More

Banks turn to alert systems to fight back against phishing attacks

By Bill Goodwin 23 Jan 2004

UK banks and retailers are investigating e-mail monitoring services that could offer early warning of “phishing” attacks by... Read More

ICO calls for review into government use of private email and WhatsApp messages

By Bill Goodwin 13 Jul 2022

Information Commissioner’s Office reprimands Department of Health and Social Care after ministers and officials conducted government business on their own email accounts and messaging apps Read More

Archiving unstructured data

By Jerome Wendt 01 Sep 2005

Companies must find ways to automate and simplify the process of archiving files and e-mail messages. ECM software addresses this large pool of unstructured data. Read More

Bridging the Cybersecurity Careers Guidance Gap

By Philip Virgo 28 Jul 2022

Current Cybersecurity Careers programmes reach barely 2% of the target audience. It is time to bridge the gap with the mainstream programmes run via the Careers and Enterprise Company with a ... Read More

STEM schooling for a world of lifelong training

By Philip Virgo 30 Sep 2021

How do we integrate the lessons learned since March 2020 and build on the existing abundance of material to “construct a really cracking educational experience to ensure that lifelong learning is ... Read More