Many organisations need to implement technology upgrades and end-to-end protection to assist them in meeting GDPR's data privacy requirements.
A higher percentage of girls are taking A-levels in the three sciences, technology and maths, yet they are still avoiding going on to study the same subjects at university, a study of 100,000 sixth formers by The Times has found.
Tech moves fast, but cryptography - the field which holds it all up - runs at a decidedly slower pace, marking its breakthroughs in years, not quarters. With something so inherently important, why would it be so slow to evolve?
A GulfTech researcher spotted multiple vulnerabilities In Western Digital's MyCloud products, some of which could lead to remote code execution and unauthorised access.
The Internet of Things (IoT) is set to revolutionise the farming and agricultural sector, but many agritech companies are concerned by the cyber-threats associated with the technology.
A new Kaspersky Lab report states that the company's threat detection technologies identified an average of 360,000 malicious files per day in 2017, an 11.5 percent increase over the previous year, and a five-fold increase since 2011.
A tech CEO noticed the free Wi-Fi at his local Starbucks didn't exactly come without a price after discovering the network was secretly jacking his computing power to mine crypto-currency.
A vulnerability found in two keyless entry door locks enables local attackers to lock and unlock doors as well as create their own RFID badges by sending unauthenticated requests to affected devices.
Implementing the best defences, tools, process and technology can help mitigate an attack and quicken time to remediation. It's important to think about not only the tools, but the process, people, intelligence and technology.
The UK Chancellor Philip Hammond, announced his autumn budget today, and while it was a pro-tech budget, he had nothing to say specifically about cyber-security, hence the industry has had a lot to say about his plans.
Senior leadership should pursue stronger business outcomes. Theresa Grafenstine says that becomes a much smoother proposition when at least one board member - ideally several - have expertise in governance of technology.
Has the one-armed bandit met its match in the sophisticated cyber-thief?
GDPR - Process change is just the beginning, but more interestingly we will see new technologies and use-cases being born and blossom that we can't yet imagine says Todd Ruback.
Email fraud can only be solved using technology to improve what is, and always has been, an inherently unsafe communication method says Nick Yarham. Remove threats & halt fraudulent attempts before they reach the end user.
Google will start shaming websites for not encrypting connections between the user and the site itself by telling users exactly when they are visiting HTTP sites
Research from security company Okta is claiming that companies which aren't agile on technology upgrades are putting themselves at risk of cyber-attacks.
A trio of students from St Petersburg State University in Russia have been dubbed world champions in the 40th annual ACM International Collegiate Programming Contest (ICPC) finals.
Chief constable Stephen Kavanagh tells techUK's Partners Against Crime seminar that the police need to engage more effectively with the private sector in developing new crime fighting capabilities.
The second annual National Unplugging Day in the UK will be held this year on 26 June 2016 to encourage families to spend the day from start to finish without any technology.
Pictfor, the Parliamentary Internet, Communications & Technology Forum convened a panel of guests from all corners of the tech world to consider the ramifications of both a vote to leave the EU and the vote to stay.
Robert Hannigan, the director of GCHQ, has called for a rapprochement of the often fraught relationship between national security bodies and the tech sector.
Due to the increasing demand of technology across the UK, IT jobs have survived the economic crisis better than any other profession.
The emergence of services such as cloud computing, data analysis, social business and mobility has brought corporate IT to what market research company IDC has dubbed the "third platform". But Wieland Alge asks, what will the third platform mean for the CIO role?
Standard security technology such as anti-virus, firewalls, intrusion detection and protection are no longer effective.