Investigation: WannaCry cyber attack and the NHS

July 12, 2017

This report investigates the NHS’s response to the cyber attack that affected it in May 2017 and the impact on health services. Investigations. We conduct investigations to establish the underlying facts in circumstances where concerns have been raised with us, or in response to intelligence that we have gathered through our wider work.

Spotlight

HEROIC Cybersecurity

Decentralized Cybersecurity powered by Artificial Intelligence. Using Big Data, Artificial Intelligence, and the Blockchain, HEROIC is powering the Next Generation of cybersecurity. Unlike traditional antivirus products, our solution takes a predictive and proactive approach to intelligently secure your devices and cloud services before an attack or threat occurs.

OTHER WHITEPAPERS
news image

State Of Zero Trust in The Enterprise:Shift To Identity-Powered Security

whitePaper | October 27, 2022

Cybersecurity has changed. The attack surface has expanded, thanks to the rapid adoption of cloud applications and services, shift to remote work, and proliferation of mobile devices. Having enterprise systems, applications, and data in one location and relying on layers of security tools and controls to keep attackers out, is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Attackers are also increasingly targeting credentials to appear as legitimate users.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

Open RAN MoU progress update on maturity, security and energy efficiency

whitePaper | September 29, 2022

As the momentum behind Open RAN continues to grow, it is natural that relevant experts and decision makers want to understand its progress and how the Open RAN industry has risen to the challenges, in particular relating to maturity, security and energy efficiency. Over the course of 2022, Open RAN MoU Operators encouraged an open dialogue about Open RAN and have taken steps to understand concerns and address valid questions. This paper represents a progress report that helps to showcase the gains and set the agenda for 2023. In summary:

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More

Spotlight

HEROIC Cybersecurity

Decentralized Cybersecurity powered by Artificial Intelligence. Using Big Data, Artificial Intelligence, and the Blockchain, HEROIC is powering the Next Generation of cybersecurity. Unlike traditional antivirus products, our solution takes a predictive and proactive approach to intelligently secure your devices and cloud services before an attack or threat occurs.

Events