Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
Unified Communication: “It should work as easily as a telephone call!”
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
Infosec culture: A former helicopter pilot's perspective
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
Mobile Payments Using Host Card Emulation with NFC
Sponsored by: TechTarget ComputerWeekly.comIn this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Royal Holloway: Corporate under-reporting of cyber crime
Sponsored by: TechTarget ComputerWeekly.comWithout reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
-
GDPR: Risk, opportunity and what it means for security professionals
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
Sponsored by: TechTarget ComputerWeekly.comAdvances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Virtual currencies and their potential role in cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.