A showcase for the key steps in the team's journey to deliver this ground breaking research.
Category: Cyber/Cloud Security
Without strong effective cyber/cloud security, technology exploitation cannot occur. Encryption, traceability, privacy, consensual data sharing, APIs and secure storage are all required in order to make the best use of AI and other disruptive technologies. This can only happen safely within legal and ethical frameworks if the foundations of the digital world are solid. We provide strategic advice linked with AI exploitation resulting in safe and secure applications.
SIA Cybersecurity Advisory Board – Resilience Series
If you missed the fun and engaging session with the SIA Cybersecurity Advisory Board we'll publish the recording when available.
Digital Identities: How Secure are They?
See the recording. Our founder Pauline Norstrom, was invited as a panelist on this fascinating webinar on Digital Identities: How Secure are They? by The OSPAs Chaired by Professor Martin Gill.
NCSC Cyber Essentials Certification
Anekanta Consulting announces that it has met all National Cyber Security Centre (NCSC) requirements and achieved Cyber Essentials Certification.
Cybersecurity Horizon Scanning
If you missed the thought leadership webinar by Security Industry Association on Risk and Exposure, here is another chance to see the full session.
Welcome aboard the Star Ship Enterprise
The “Star Ship Enterprise” was the innovation hub at the heart of the iconic 60’s TV series. Long before space exploitation became a reality, futurists created images of society enhanced by invention to improve humanity.When both satellite-based technology and AI…
Ambiguous Threats and AI?
This isn't about politics. See what we may learn from this article in HBR about leadership in the COVID-19 crisis and think about how the paradigm applies to the growing trend towards utilising Artificial Intelligence to assist in better decision…