In an international economy which is becoming increasingly dependent on technology (i.e. Smart Grids, Cryptocurrency, Biometrics), the increased demand for skil...
Should we stop talking about women in cyber security?
It is easy to dismiss the discussion of ‘women in cyber security’ as a boring one – the story doesn’t e...
The underrepresentation of women in the technology workforce, and particularly in cyber security, is complex and multilayered, yet for some women, it may be as ...
It is no secret that the cyber security industry suffers from a lack of gender diversity and it is estimated that only 10% of the global information security wo...
What image flashes in your mind when you hear the word cybersecurity? Is it a room filled with happy, diverse, productive people making a difference in the worl...
Accomplished people rarely sit back and let things happen to them. They go out and happen to things.
And now is the time for women to make things happen.
...
Use of the Cloud has boomed in recent years. The most familiar reason for this is as a storage solution with the Cloud’s main selling points being accessibility...
Jessica Williams is a Security Consultant at BT. She is a computer games programmer turned cyber consultant who is interested mostly in education and defence. J...
Two-factor, or what is often called Multi-Factor, Authentication is definitely the best way to defeat hackers because they render stolen passwords almost useles...
In this era of digitalisation, everyday tasks are now easier to complete and much can be done with a touch of a button. But as I am completing my Masters degree...