RSS - BCS - Latest Security, Data and Privacy Articles
  • Castle On Island
    Information security used to be simple. We locked doors, bolted windows, and that was sufficient. We took our cues for IT security architecture design from the same places, castles, walls, defence in depth, onion models, and network security based models positioned against external attack. These risks are not entirely the whole story says Ralph O’Brien MBCS.
  • Children Map Reading In Back Of Car
    In an age of increasing numbers of cyber threats businesses and individuals alike need to become more security savvy. But in today’s increasingly complex digital environment can information security really mitigate against larger scale attacks? Daniel Gifkins, Alban Consultants, investigates and asks: are we there yet?
  • Hackers Laptop
    The concern over remote administration tools known as RATs, which are used to spy on computer users without their knowledge, is growing. Lawrence Jones, CEO at UKFast, explains how RATs are used and how to prevent attacks on your computer.
  • Hand On Touchscreen
    Biometric authentication holds a lot of promise for identity and access management. Industry analysts laud the new technology and jostle to take the stand as the authority on the subject.
  • Woman Typing
    Peter Singleton considers the application of autonomy to what are commonly called ‘secondary uses’ of healthcare data.

Related Publications

Mobile Computing: Securing your workforceMobile Computing
Written by security experts this ebook looks at the pitfalls and solutions of a mobile workforce.

Information Security Management Principles - Second editionInformation Security Management Principles (Second edition)
A pragmatic guide for both business professionals and technical experts.


The Essential Guide to Computer SecurityEssential Guide to Home Computer Security
'Digital commonsense' for the non-technical home and small-office computer user.