Defend as one
Work together as one community and help support each other against the threat of cybercrime.
Lo sentimos, esta página no ha sido traducida aún.
The cybersecurity threat landscape is always evolving, and attacks are becoming more prevalent and sophisticated.
Explore our collection of educational resources designed to empower you with the knowledge and tools to safeguard yourself and your organization from cyber-threats. Join us in building a safer, more secure digital future.
Work together as one community and help support each other against the threat of cybercrime.
Participate in and support organization-wide training and skills that are critical to identifying and mitigating against cybersecurity threats. Guidance from the National Cyber Security Centre (NCSC), Universities UK (UUK) and Jisc explains why prevention is better than cure.
Apply security by design concepts in product development to help protect organizations and users. An example of security by design is the OpenAthens Federation where providers of content and services agree to pass verified and encrypted information to library organizations within the trust fabric of our federation.
10 October 2024, 15:00 BST/ 10:00 EDT
In this Cyber Security Month webinar, our platform engineer and security and compliance coordinator, Joe Bromley, explains how our product has security controls built into it by design. He will also discuss how we manage security within our team and how we comply with security standards and data protection laws. You’ll have the chance to ask us any questions during the webinar.
Education and research organizations are a prime target for cyber-attacks because of the valuable data they hold. We outline some of the key actions librarians and publishers can take now to help protect against cyber-attacks.
30 October 2024, 15:00 BST/ 10:00 EDT
In this Cyber Security Month webinar, guest speakers Sari Frances and Brian Kelly will review the recent Scholarly Networks Security Initiative (SNSI) report that highlights cybersecurity risks to scholarly publishing and how to start a conversation with your information security team.
Guest speakers:
As the pharmaceutical industry becomes increasingly digital and data-driven, safeguarding sensitive information and infrastructure against cyber threats is is becoming ever more essential. Our blog explores some of the issues facing the pharmaceutical and healthcare industry.
GÉANT Cyber Security Month 2024 webinar program focuses on social engineering techniques. The webinars encourage users to think critically and remain vigilant to stay one step ahead of cyber criminals.
In our 2023 cybersecurity webinar, we outline how OpenAthens can help protect content from misuse in a more targeted way – thanks to the benefits of federated access.
Neil Scully, trust and identity CTO at Jisc discusses how we deliver effective security, while keeping things simple for learners and researchers.
There are many library authentication solutions available, and this makes it challenging for librarians to know which one to choose. We summarize a few of the reasons librarians choose us as a trusted solution.
Authentication, authorization, cookies, passwords, security, user privacy… Heard about all these terms but want a better understanding of what they are and how they impact you? Watch our easy-to-follow case study and learn all you need to know about security and user privacy.
Discover how the University of Melbourne increased active users by nearly 50% during the pandemic, whilst maintaining data security. This case study webinar will also explore the challenges faced and discuss important lessons learned.
When the IT team at Iowa State University Library learned that the library had experienced security issues that resulted in a temporary loss of guest users’ access to some publisher resources, both library and IT teams began looking for a more secure, single sign on authentication solution.
We will use the contact details you provide to us to send you information about our products and services.
You can opt out of our emails at any time by using the link in the emails and you can view our privacy policy.
All required fields are marked with '*'