Search Results for "Royal Holloway Information Security series"
-
Underexposed risks of public Wi-Fi hotspots
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi hotspots.
-
Unified Communication: “It should work as easily as a telephone call!”
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
The difficulties of defending against web tracking
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
-
GDPR: Risk, opportunity and what it means for security professionals
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Bluetooth Low Energy: The IoT battle
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
-
Security visualisation
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities.
-
Sleeping Android: the danger of dormant permissions
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.