RSS - BCS - Latest Security, Data and Privacy Articles
  • Woman In Underpass
    With so much more malware now being designed specifically to exploit mobile device vulnerabilities, the protection of businesses from this recent security scourge has risen up the agenda of many a CIO. Sean Newman, Security Strategist, Cisco, investigates.
  • Castle On Island
    Information security used to be simple. We locked doors, bolted windows, and that was sufficient. We took our cues for IT security architecture design from the same places, castles, walls, defence in depth, onion models, and network security based models positioned against external attack. These risks are not entirely the whole story says Ralph O’Brien MBCS.
  • Children Map Reading In Back Of Car
    In an age of increasing numbers of cyber threats businesses and individuals alike need to become more security savvy. But in today’s increasingly complex digital environment can information security really mitigate against larger scale attacks?
  • Hackers Laptop
    The concern over remote administration tools known as RATs, which are used to spy on computer users without their knowledge, is growing. Lawrence Jones, CEO at UKFast, explains how RATs are used and how to prevent attacks on your computer.
  • Hand On Touchscreen
    Biometric authentication holds a lot of promise for identity and access management. Industry analysts laud the new technology and jostle to take the stand as the authority on the subject.

Related Publications

Mobile Computing: Securing your workforceMobile Computing
Written by security experts this ebook looks at the pitfalls and solutions of a mobile workforce.

Information Security Management Principles - Second editionInformation Security Management Principles (Second edition)
A pragmatic guide for both business professionals and technical experts.


The Essential Guide to Computer SecurityEssential Guide to Home Computer Security
'Digital commonsense' for the non-technical home and small-office computer user.