Blogs

Items list updated: displaying 10 Items
thumbnail image for Spreading the Message about Critical National Infrastructure Cybersecurity

Spreading the Message about Critical National Infrastructure Cybersecurity

Posted on: 25 October 2024 by Charles Weir

Lancaster University's Dr Charles Weir, Dr Cecilia Loureiro-Koechlin, PhD student Lucy Hunt and Senior Lecturer Louise Dennis of the NWPST Interlinked Project, recently led a successful workshop with experts in the cybersecurity of the UK’s critical infrastructure.

thumbnail image for Why you should use 2-Factor Authentication

Why you should use 2-Factor Authentication

Posted on: 13 August 2024 by Patrick Dastey

Password protection is quite frequently the last and only layer of defence between criminals and our personal data. Whilst passwords can be very secure, there are always issues regarding online password leaks, hacking, email phishing and more. If there is only one layer of protection for our personal data, all it takes is one slip up to have potentially major repercussions. This is why having at least one more level of security is always a good idea. Enter 2-Factor Authentication (2FA).

thumbnail image for How can the ISO 27001 framework help your business with cyber security?

How can the ISO 27001 framework help your business with cyber security?

Posted on: 25 July 2024 by Alexander Lee and Cyber Works - Blogs

There is a wide range of standards in the ISO/IEC 27000 series, but ISO 27001 is the most notable, as it covers all aspects of security. The certification proves to customers, partners and stakeholders that your organisation safeguards the data that it holds.

thumbnail image for Hassan Raza - Profile of a Cybersecurity Leader

Hassan Raza - Profile of a Cybersecurity Leader

Posted on: 8 July 2024 by Hassan Raza

Hassan Raza - Profile of a Cybersecurity Leader

thumbnail image for Reflections from CYBERUK 2024: Insights for Leadership in Cybersecurity

Reflections from CYBERUK 2024: Insights for Leadership in Cybersecurity

Posted on: 20 May 2024 by Avril Palmer-Fye

Reflections from CYBERUK 2024: Insights for Leadership in Cybersecurity

thumbnail image for The Complexity of the Cyber Cultural Tipping Point

The Complexity of the Cyber Cultural Tipping Point

Posted on: 9 May 2024 by Daniel Prince

The Complexity of the Cyber Cultural Tipping Point - By Professor Dan Prince 

thumbnail image for The Value of Personal Development in Cyber Leadership

The Value of Personal Development in Cyber Leadership

Posted on: 8 March 2024 by Avril Palmer-Fye

Join Avril Palmer-Fye, the new Co-Director for the Cyber Executive MBA (CEMBA) programme, as she considers the role of personal development and coaching and mentoring on cyber leadership and outlines her top 5 things a Cyber Leader needs to know!

thumbnail image for About TAS-S

About TAS-S

Posted on: 19 September 2023 by Joe Deville, Corinne May-Chahal and Luke Moffat

TAS-S assembles a cross-disciplinary team of internationally reputed security experts from Lancaster and Cranfield Universities who are based across a wide range of research areas including Distributed Systems, Communications, Controls, AI, Sociology and Law.

Here team members Dr Joe Deville, Dr Luke Moffat and Professor Corinne May-Chahal discuss interdisciplinary autonomous system security.

thumbnail image for State of the Nation and a Look Ahead

State of the Nation and a Look Ahead

Posted on: 31 August 2023 by Andrew Fitzmaurice

Join Andrew Fitzmaurice, CEO of Templar Executives, as he reflects on some of the key issues from CyberUK held on the 19th and 20th April 2023 and looks ahead to some of the hot topics leaders need to consider in the area of cyber leadership.

thumbnail image for Unlocking Employment Opportunities in Cyber Security

Unlocking Employment Opportunities in Cyber Security

Posted on: 31 August 2023 by Robyn Remke

Dr Robyn Remke, Director of Lancaster's Fulltime MBA, and Co-Director of their Cyber Security Executive MBA, discusses how cyber security skills have changed and the growing need for greature maturity in cyber executive educational pathways.