Defend as one
Work together as one community and help support each other against the threat of cyber crime.
The cyber security threat landscape is always evolving, and attacks are becoming more prevalent and sophisticated.
Explore our collection of educational resources designed to empower you with the knowledge and tools to safeguard yourself and your organization from cyber threats. Join us in building a safer, more secure digital future.
Work together as one community and help support each other against the threat of cyber crime.
Participate in and support organization-wide training and skills that are critical to identifying and mitigating against cyber security threats. New guidance from the National Cyber Security Centre (NCSC), Universities UK (UUK) and Jisc explains why prevention is better than cure.
Apply security by design concepts in product development to help protect organizations and users. An example of security by design is the OpenAthens Federation where providers of content and services agree to pass verified and encrypted information to library organizations within the trust fabric of the federation.
There are many library authentication solutions available, and this makes it challenging for librarians to know which one to choose. Librarians need to work within the confines of tight budgets and demanding stakeholders. We have summarized a few of the reasons librarians choose us as a trusted solution in our latest blog.
In this Cyber Security Month webinar, Trust and Identity CTO Neil Scully outlines the security risks to organizations and publishers if access is provided with no limits or controls. Neil goes on to explain how our team monitors misuse and the benefits to customers.
How can OpenAthens deliver effective security, while keeping things unobtrusive for learners and researchers? The simple answer is that we use federated access, which allows users to access resources via single sign-on, within a network of trust. But there are also out-of-the-box features and characteristics of OpenAthens that help deliver security effectively.
Authentication, authorization, cookies, passwords, security, user privacy… Heard about all these terms but want a better understanding of what they are and how they impact you? Watch our easy-to-follow case study and learn all you need to know about security and user privacy.
Discover how the University of Melbourne increased active users by nearly 50% during the pandemic, whilst maintaining data security. This case study webinar will also explore the challenges faced and discuss important lessons learned.
When the IT team at Iowa State University Library learned that the library had experienced security issues that resulted in a temporary loss of guest users’ access to some publisher resources, both library and IT teams began looking for a more secure, single sign on authentication solution.
We will use your contact details to respond to your request.
View our privacy policy to find out more.
All required fields are marked with '*'