Sign up to our newsletter below.

First name
Last name
Email
Company
Job Title
Industry
We see you're using an obsolete browser. For a better experience when browsing The New Economy, and for a better web, please consider switching to a newer browser. For more information on popular browsers please see browsehappy.com.
Digital editions
Link to digital editions
Link to Digital Symphony
Link to Regenerative Healthcare
Link to Waste Management
Link to SAP
Link to IBM
Link to Ingenuity Lab
Link to Carnival Corporation
Link to The New Economy Awards 2016

  • Sustainable Innovation Forum 2016
  • Cloud Computing Forum 2015
  • World Pension Sumit 2015
  • Broadband World Forum 2015
  • Mobile World Congress

Insights

Nuclear waste will remain a deadly threat for hundreds of thousands of years. Despite having decades of hazardous waste in temporary storage, the world is only now finalising plans for long-term containment

Onkalo aims to solve the 100,000-year problem of nuclear waste storage

Nuclear waste will remain a deadly threat for hundreds of thousands of years. Despite having decades of hazardous waste in temporary storage, the world is only now finalising plans for long-term containment

cybersecurity

Technology China's introduction of a new cybersecurity law threatens to stifle innovation and harm international business

China’s cybersecurity law threatens business

China’s introduction of a new cybersecurity law threatens to stifle innovation and harm international business

Concerning: ,
Technology With IT professionals and users regularly venting frustrations about them, one might wonder why passwords have endured for so long. It turns out the ageing security measure is not so easily replaced

How to choose a strong password

With IT professionals and users regularly venting frustrations about them, one might wonder why passwords have endured for so long. It turns out the ageing security measure is not so easily replaced

Concerning:
Business In the largest ever publicly disclosed security breach, Yahoo has admitted that user information from 500 million accounts, including names, emails and unencrypted security questions, has been stolen

Hackers steal data from 500 million Yahoo users

In the largest ever publicly disclosed security breach, Yahoo has admitted that user information from 500 million accounts, including names, emails and unencrypted security questions, has been stolen

Concerning: ,
Strategy Amid the ongoing battle with terrorist organisations, EU powers urge the European Commission to ban end-to-end encryption

France and Germany call for encryption ban

Amid the ongoing battle with terrorist organisations, EU powers urge the European Commission to ban end-to-end encryption

Technology Following privacy concerns in the build-up, the Australian Bureau of Statistics has revealed that Australia’s online census system was subjected to a cyber-attack and temporarily shut down

Australian online census attacked

Following privacy concerns in the build-up, the Australian Bureau of Statistics has revealed that Australia’s online census system was subjected to a cyber-attack and temporarily shut down

Concerning: ,
Technology The internet and modern society would not be as we know them today were it not for the latest winners of the Turing Award. In light of their win, we explore the history of cryptography and the impact made by its greatest proponents

The secret history of cryptography

The internet and modern society would not be as we know them today were it not for the latest winners of the Turing Award. In light of their win, we explore the history of cryptography and the impact made by its greatest proponents

Concerning:
Technology Ransomware is a profitable racket for cybercriminals, so attacks are only set to continue

Ransomware attacks threaten online security for businesses

Ransomware is a profitable racket for cybercriminals, so attacks are only set to continue

Concerning:
Technology People and companies have struggled to escape passwords, but credible alternatives might finally be emerging

The slow death of passwords

People and companies have struggled to escape passwords, but credible alternatives might finally be emerging

Mobile World Congress 2016 Forget thumbprints: the future of verification is selfies and hearbeats, says Ajay Bhalla

Mobile World Congress 2016: Selfies for payment security

Forget thumbprints: the future of verification is selfies and hearbeats, says Ajay Bhalla

Technology Tech giants, law professors and NGOs support Apple in its fight against the FBI over the right to privacy

Tech companies back Apple’s battle against the FBI

Tech giants, law professors and NGOs support Apple in its fight against the FBI over the right to privacy

Concerning: , ,
Mobile World Congress 2016 Having opposed a court order to unlock the iPhone of one of the San Bernardino shooters, Apple continues its battle with the FBI

Apple is battling the FBI to protect privacy

Having opposed a court order to unlock the iPhone of one of the San Bernardino shooters, Apple continues its battle with the FBI

Technology The bank will roll out biometric technology this summer to help protect customers' accounts

HSBC launches voice and fingerprint security

The bank will roll out biometric technology this summer to help protect customers’ accounts

<< Older posts

Explore the archive...