Security, Data and Privacy Article Archive

  • Connor Morley and Diane Gan, from the CSAFE Research Centre at the University of Greenwich, discuss a new tool for detecting and accessing TrueCrypt containers.
  • Aftab Afzal, Senior Vice President and General Manager EMEA, at NSFOCUS IB asks: how has the DDoS attack evolved over the past 25 years; has the ever growing internet of things affected the growth of DDoS attacks at all; and what can we expect in the future?
  • Those who know they are inventing the future often have minimal, if any, concern for understanding what has gone before. Therefore, what can be done, and what is being done, to improve IoT privacy and security can be worlds apart.
  • John Mitchell, Workshop Liaison, BCS Information Risk Management and Assurance Specialist Group, discusses information systems assurance from the back room to the front office - a 50 year journey.
  • David Bird MBCS CITP discusses the challenges that public cloud security holds for the cloud user.
  • John Mitchell FBCS, with his risk analysis head on, discusses why WannaCry became a severe case of ‘ReallyCry’.
  • Could the cyber-attack trends from the first half of 2017 be extrapolated for the second half of the year?
  • William Seymour MBCS, PhD Student at the University of Oxford, discusses the opportunities that Capture the Flag events hold for both students and employers.
  • Tim Nyland-Jones, Information Security Manager at Northgate Vehicle Hire, investigates why IoT software and interoperability are still a long way from being standardised.
  • Maxine Mackintosh, data scientist, researcher and co-founder of HealthTech Women UK, tells the BCS editorial team why we need to ensure public support for sharing.