The Cyber Foundry is part funded by the European Regional Development Fund
The Greater Manchester Cyber Foundry
The Cyber Foundry Resources
A series of articles written by various members of the team, intended to be short introductions to cyber security concepts written in a non-technical way.
An Interview With ChatGPT
At the time of writing this article there are a lot of conversations about the risks and benefits of AI and its potential impacts on society. We thought it would be interesting to interview OpenAI’s ChatGPT for its own thoughts on the potential risks of AI to Cyber Security.
Leveraging Threat Intelligence Services
In an era dominated by digital transformation, small and medium-sized enterprises (SMEs) are facing an escalating number of cyber threats. Whether it is safeguarding your customers' data or ensuring the integrity of your internal systems, the significance of cyber security cannot be understated.
Secure by Design
In an era characterised by rapid technological advancement and increasing digitization, security has become a core prerequisite for successful business operations. Today's SMEs are not just operating in physical spaces; they are increasingly embracing the digital frontier for its incredible efficiencies and competitive advantages.
Cyber is Business Challenge
As we move further into the age of digital globalization cyber security has emerged as a pressing concern for anyone that uses digital technology. Business leaders must move away from the idea that such concerns are confined to IT departments, and recognise the duties extending to senior management.
Collaborative Cyber Security
In today's digitally-driven era, cybersecurity is a priority for all businesses, regardless of size. Small and Medium Enterprises (SMEs) are particularly vulnerable, as they often lack the resources of larger companies to implement comprehensive cybersecurity measures. Yet, through collaboration, SMEs can overcome these challenges, effectively developing, and implementing a shared cybersecurity plan and protocol.
21 Useful Cyber Security Terms
In today's digital age cyber security is both relevant and highly important to small and medium sized enterprises (SMEs). With cyber threats evolving rapidly, it is crucial for SME owners and managers to be familiar with the fundamental concepts of cyber security.
Industrial Internet of Things
The Internet of Things (IoT) goes beyond smart speakers and home heating. It is revolutionising and enhancing all of industry, from work safety to better logistics and more. In this article we explore the cyber security implications of the Industrial Internet of Things.
If you would like to know more about this then you can click the link below to download the full article (PDF):
Counterfeit Devices: Protecting your business from imitation hardware
As the costs of research and development rise, innovative hardware devices that reflect these increased expenses are being targeted by counterfeit criminals.
If you would like to know more about this then you can click the link below to download the full article (PDF):
Advanced Persistent Threats: What are they and do they really exist?
The use of the term Advanced Persistent Threat has been on the rise lately, as more evidence is shared that not only proves they exist, but they are actively attacking targets
If you would like to know more about this then you can click the link below to download the full article (PDF):
Logging: What is it and why is it important?
Log files are highly valuable data sets that are frequently used by software developers and engineers to understand what has gone wrong. Is that the limit to their value?
If you would like to know more about this then you can click the link below to download the full article (PDF):
Social Engineering: Hacking the Human
We live in a digital age where technology is continually improving. Whilst cybersecurity is constantly evolving to combat cybercriminals, human psychology remains relatively unchanged. Social engineering is a threat we must always consider. This article looks to inform you what it is, and how to stay ahead of it.
If you would like to know more then you can click the link below to download the full article:
Formjacking: What is it and how does it work?
Formjacking is a relatively new technique which cyber criminals are using to exploit and steal potentially sensitive information from commercial websites.
If you would like to know more about this then you can click the link below to download the full article:
8 Cyber Innovation Predictions for 2020
2019 was an eventful year and the end of an eventful decade for cyber innovations. We predict that the next decade will bring even more disruptions and opportunities. Starting with the incumbent year see below for our eight headline predictions for 2020
If you would like to know what we think lies ahead then click the link below to download the full article:
Blockchain: Cutting Through the Hype
“Don’t be fooled by unrealistic predictions of returns and claims made through press releases, spam email, telemarketing calls, posts online or in social media threads. These actions may be signs of a classic ‘pump and dump’ fraud”
–Financial Industry Regulatory Authority
Does your business need to consider blockchain?
With all the talk surrounding blockchain and Bitcoin, it is often hard to spot the hype from reality. With every new technology, there is a rush to implement it into your business model to show your business is on the cutting edge, however as history has often taught us, early adopters can sometimes be stung. Click the link below to download the full article:
What is a Cyber Assist Project?
The Greater Manchester Cyber Foundry (GMCF) offers the opportunity for small to medium enterprises to explore the development of new digital products and services.
The GMCF Cyber Innovation team provides a Research & Development service, enabling practical investigation of innovative applications of technology within a business, often leading to a software prototype.
If you would like to learn more about this service, please download the GMCF Tech Assist Article.