RSS - BCS Security, Data and Privacy Blog Posts
  • Recently I was retained as an external data protection officer (DPO) for a medium sized organisation, with offices and employees in the UK, USA, and mainland Europe.
  • Alec Auer, a penetration tester who has conducted dozens of phishing attacks, takes a look at how employees respond to phishing attacks and where it could be improved.
  • Alex Archondakis, from the BCS Internet Specialist Group, discusses the rising trend of using social media for spear phishing.
  • Benjamin Donnachie, BCS ISG member, explains how compliance does not necessarily guarantee security.
  • Data networks are significant for many reasons, including them having had a long history, and having been used in different domains. The enterprise domain and the Telco domain are two such domains within which we have seen extraordinary changes in the recent past.
  • Alec Auer, a penetration tester who has conducted dozens of phishing attacks, looks at some of the traits which can be exploited to increase the response rate from employees.
  • Chris Yapp Blog Avatar
    This is my 151st post on this blog and time for me to stand down. I’ve enjoyed the opportunity to share some thoughts with the BCS community for over nine years. I want to take this opportunity to reflect on some of the constant challenges I’ve seen in presentations, books, articles and business cases over the last 30 years.
  • Pervez Ibrahim, an IT practitioner since 1977 and SAP software consultant since 1988, overviews the inter-connected world and encourages others to get involved and to update their digital skills.
  • Chris Yapp Blog Avatar
    One model much used over the last 20 years or more to discuss the transformation in society and the economy that we are seeing is the notion of “data is the new oil”. The story generally goes that we are in the third age of homo sapiens. The first was an age defined by materials (stone, bronze) and the second defined by energy (steam, electricity, oil).
  • Mark Samuels, Harvey Nash looks at the skills or capability gap in relation to cyber threat.