RSS - BCS - Latest Security, Data and Privacy Articles
  • Woman Holding Smart Device
    Having worked in the data management industry for nearly two decades, Lilian Smit had noticed that ‘the new data culture’, promised by the introduction of cloud technologies, hasn’t quite taken off to the level promised to the enterprise market.
  • Judo Throw
    Is someone listening to your private conversations using your smart TV? Are criminals controlling your fridge? Or are DDoS attacks stopping you accessing the internet? Claire Woollacott from Actica Consulting, asks: What are you going to do about it?
  • Weak Link In Chain
    Robin Oldham, Head of Security Consulting Practice, BAE Systems, discusses what questions should be asked and what can be done to help protect businesses from cyber-attacks via a third party supplier network.
  • Magnifying glass and files
    Connor Morley and Diane Gan, from the CSAFE Research Centre at the University of Greenwich, discuss a new tool for detecting and accessing TrueCrypt containers.
  • Bees swarming on honeycomb
    Aftab Afzal, Senior Vice President and General Manager EMEA, at NSFOCUS IB asks: how has the DDoS attack evolved over the past 25 years; has the ever growing internet of things affected the growth of DDoS attacks at all; and what can we expect in the future?

Blueprint for Cyber Security

Our vision is a world properly protected from cyber threat. This blueprint sets out how we can deliver that solution, starting in health and care.

Related Publications

Mobile Computing: Securing your workforceMobile Computing
Written by security experts this ebook looks at the pitfalls and solutions of a mobile workforce.

Information Security Management Principles - Second editionInformation Security Management Principles (Second edition)
A pragmatic guide for both business professionals and technical experts.


The Essential Guide to Computer SecurityEssential Guide to Home Computer Security
'Digital commonsense' for the non-technical home and small-office computer user.