• Topics
  • Cyber Security
  • Digital Transformation
  • Responsible Business
  • Young Tech Talent
  • Innovation
  • News
  • Industries
  • Retail
  • Financial Services
  • Public Sector
  • Transport
  • Energy & Utilities
  • Education
  • Manufacturing
  • Defence & National Security
  • Media
  • Healthcare
  • Built Environment
  • General
  • Authors
  • Fujitsu UK
  • Fujitsu Ireland
  • Contact
Back to home page
  • Industries
    • Retail
    • Financial Services
    • Public Sector
    • Transport
    • Energy & Utilities
    • Education
    • Manufacturing
    • Defence & National Security
    • Media
    • Healthcare
    • Built Environment
  • Topics
    • Cyber Security
    • Digital Transformation
    • Responsible Business
    • Innovation
    • News
  • Authors
  • Contact
  • Accessibility
  • Other Fujitsu websites
    • Fujitsu UK
    • Fujitsu Ireland
  • RSS twitter Linkedin Facebook YouTube
Cyber Security
Sarah Collins
Written by Sarah Collins on September 3, 2020

Should the recent attack on Twitter impact decisions on whether to deploy services to the cloud?

On 15th July, Twitter fell victim to a highly visible, sophisticated cyberattack. The hacking of high-profile accounts on a social media platform that carries the opinions of world leaders and technology moguls could potentially have a far-reaching impact on world affairs. But...
Public Sector

How the public sector is keeping UK citizens safe from cyber-attack

Experts at the World Economic Forum classified the threat of a cyber-attack as one of the top three most probable global risks of...
Imattsmart Vp3owlsposs Unsplash

How the cybersecurity landscape changed post-Covid-19

11/09/2020
David Patrick
The Covid-19 pandemic has been a mammoth test of our economy’s resilience. In the space of just a few weeks,... Read more
Robynne Hu Horhcnqsxnq Unsplash

If AI is the answer, what’s the question?

04/02/2020
Mark Wixey
Artificial Intelligence – or AI – is the shiny new toy that everyone in the IT world wants to... Read more
Data Protection And Insurance. Concept Of Business Security System.

Is there a quantum computing storm on the horizon?

09/11/2019
Mark Wixey
The potential applications and benefits derived from quantum are huge with promises of significant advances in a myriad of... Read more
Image of Fujitsu Security Operations Centre

Bulletproof your organisations’ security with Cyber Threat Intelligence

16/04/2018
Dave Markham
As seen in recent years, all organisations in the public or private sector, no matter what... Read more
Pexels Photo 577585

A “better to ask for forgiveness than permission” approach to data protection no longer stands

28/03/2018
Mike Smit
With the latest news around Facebook revealing just how enormous the... Read more
The Year Ahead: Five Key Thoughts on Cyber Security In 2018

The Year Ahead: Five Key Thoughts on Cyber Security In 2018

05/01/2018
Paul McEvatt
Data is all around us, from the way doctors use it to better understand patients to... Read more
Why misuse of enterprise platforms could be your worst nightmare

Why misuse of enterprise platforms could be your worst nightmare

31/10/2017
Paul McEvatt
The internet can be a frightening place, where the spectre of cyberattack is never far away. This... Read more
Header photo showing abstract code illustration

Chain phishing attacks affecting O365 customers

06/09/2017
Paul McEvatt
A range of services are available within Microsoft’s Office 365 platform, including Skype, Office, OneDrive and SharePoint.  All of... Read more
Bridging the security talent gap will ensure a safer Britain

Bridging the security talent gap will ensure a safer Britain

14/08/2017
Fiona Boyd
Wherever you look, there’s no denying that technology is a force to be reckoned with. This... Read more
Global malware outbreaks: An insight into Incident Response & Security Operations

Global malware outbreaks: An insight into Incident Response & Security Operations

05/07/2017
Dave Markham
With two major attacks making headlines in the last two months,... Read more
Petya, Medoc and the delivery of malicious software

Petya, Medoc and the delivery of malicious software

30/06/2017
Paul McEvatt
When our Cyber Threat Intelligence team run passive threat assessments on behalf of organisations, we clearly define issues mapped... Read more
How to train the cyber security pros of the future

How to train the cyber security pros of the future

19/04/2017
Fiona Boyd
As technology continues to advance and become ever more intertwined with our work and personal lives, so too grows... Read more
Older Entries

Most read articles

Tweets by @fujitsu_uk

Monthly archives

  • January 2021 (5)
  • December 2020 (3)
  • November 2020 (5)
  • October 2020 (9)
  • September 2020 (4)
  • August 2020 (5)
  • July 2020 (7)
  • June 2020 (2)
  • May 2020 (6)
  • April 2020 (4)
  • March 2020 (7)
  • February 2020 (2)

Yearly archives

  • 2021 (5)
  • 2020 (56)
  • 2019 (62)
  • 2018 (82)
  • 2017 (128)

This website uses cookies, find out more...

Privacy Policy

Products

  • Fujitsu Servers
  • Storage
  • Client Computing Devices
  • Peripheral devices
  • Software

Services

  • Application Services
  • Biometrics and Identity Management
  • Fujitsu Consulting Services
  • Dynamic Infrastructures

Features

  • Videos
  • Fujitsu Case Studies
  • Fujitsu Vision

Corporate

  • About Fujitsu in the UK and Ireland
  • Corporate Profile
  • Careers at Fujitsu
  • Corporate Responsibility

Fujitsu global websites

United Kingdom

Select a global site

World Map

  • Terms of use
  • Privacy
  • Code of Conduct
  • Comments Policy
  • Contact

Copyright 1995 - 2021 FUJITSU