The growing embrace of big data makes identity an increasingly contentious space. Researchers Ned Rossiter and Soenke Zehle's work explores where the new digital world might take us.
Revelations that security forces have broken the protection of mobile phone technology are a real concern. Mike Richards explains why - and how the hack works.
Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks.