Security, Data and Privacy Article Archive

  • Having worked in the data management industry for nearly two decades, Lilian Smit had noticed that ‘the new data culture’, promised by the introduction of cloud technologies, hasn’t quite taken off to the level promised to the enterprise market.
  • Is someone listening to your private conversations using your smart TV? Are criminals controlling your fridge? Or are DDoS attacks stopping you accessing the internet? Claire Woollacott from Actica Consulting, asks: What are you going to do about it?
  • Robin Oldham, Head of Security Consulting Practice, BAE Systems, discusses what questions should be asked and what can be done to help protect businesses from cyber-attacks via a third party supplier network.
  • Connor Morley and Diane Gan, from the CSAFE Research Centre at the University of Greenwich, discuss a new tool for detecting and accessing TrueCrypt containers.
  • Aftab Afzal, Senior Vice President and General Manager EMEA, at NSFOCUS IB asks: how has the DDoS attack evolved over the past 25 years; has the ever growing internet of things affected the growth of DDoS attacks at all; and what can we expect in the future?
  • Those who know they are inventing the future often have minimal, if any, concern for understanding what has gone before. Therefore, what can be done, and what is being done, to improve IoT privacy and security can be worlds apart.
  • John Mitchell, Workshop Liaison, BCS Information Risk Management and Assurance Specialist Group, discusses information systems assurance from the back room to the front office - a 50 year journey.
  • David Bird MBCS CITP discusses the challenges that public cloud security holds for the cloud user.
  • John Mitchell FBCS, with his risk analysis head on, discusses why WannaCry became a severe case of ‘ReallyCry’.
  • Could the cyber-attack trends from the first half of 2017 be extrapolated for the second half of the year?