Scaling Vendor And Project Security Risk – Are you going to assess them all?
Are you seriously going to ask your milkman the same security questions as your network hosting partner? Of course not. But between those extremes, companies have a world of pain working out how much...
View ArticleHow Much Security Is Enough? Part 1
When it comes to cyber, information, IT (or whatever you choose to prefix it with) security, where do you draw a compliant and cost-effective line? Where, between gold-plated and the status quo, is...
View ArticleWhen All Attempts At InfoSec Education Fail…
If it's not making sense in technical, business, risk or finance language and there's little reaction to endless news of giant data breaches, perhaps it's time to get creative
View ArticleSchrödinger’s Risk
Just like Schrödinger and his quantum feline, most companies are just making assumptions about the state of their cybersecurity risks.
View ArticleWhy Isn’t The Cyber World Burning?
The interweb says it should be. Every day, in every way, it’s getting FUDdier: Cyberterrorists, Cyberespionage, Cybercriminals, Cyberbogeymen. Cybercars, Cyberheating, Cybercyber. By rights nothing...
View ArticleOhhhhh P M
My contribution to the reams written about the catastrophic OPM breach. Born out of weariness and the realisation that cybersecurity breach related news is sometimes repetitive for a reason...
View ArticlePokerising Cybersecurity
Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?
View ArticleA Rash Of #InfoSec #Analogettes
A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if […]
View ArticleVTech Breach -Data, Data Everywhere
Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.
View ArticleData Breach Grief & Bringing Incident Response Brooms To Gunfights
Breaches hurt, incident management is a strategic security priority, and legal notification requirements are ramping up. But how does that translate into action, and are firms learning from mistakes?
View ArticleThe Cybersecurity Prayer
A little irreverent levity for beleaguered security pros everywhere: The Cybersecurity Prayer Our metadata, that art in clouds, cyber attack fodder be thy name… Thy nation state be backing, thy...
View ArticleWhen Mum’s LinkedIn Password Is Nicked
Part of the Infospectives Diary Of An InfoSec Kid series. Originally written about the Kiddicare hack, but now 117 Million LinkedIn usernames and passwords have been found for sale on the darknet The...
View ArticleUPDATED: Swift Financial System Breaches…or far more mundane failings?
In mid May we found out the Bank of Bangladesh lost a reported $81m when crooks managed to fraudulently redirect funds to shady recipients via the Swift international money transfer system. Then we […]
View ArticleThe Cybersecurity Prayer
A little irreverent levity for beleaguered security pros everywhere: The Cybersecurity Prayer Our metadata, that art in clouds, cyber attack fodder be thy name… Thy nation state be backing, thy...
View ArticlePokerising Cybersecurity
Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?
View ArticleFrozen: The InfoSec Remix…
Re-relased for Christmas 2015 the original Infospectives InfoSec Karaoke. Are you a security songstress? We'd love to hear your version.
View ArticleSchrödinger's Risk
Just like Schrödinger and his quantum feline, most companies are just making assumptions about the state of their cybersecurity risks.
View ArticleWhy Isn't The Cyber World Burning?
The interweb says it should be. Every day, in every way, it’s getting FUDdier: Cyberterrorists, Cyberespionage, Cybercriminals, Cyberbogeymen. Cybercars, Cyberheating, Cybercyber. By rights nothing...
View ArticleOhhhhh P M
My contribution to the reams written about the catastrophic OPM breach. Born out of weariness and the realisation that cybersecurity breach related news is sometimes repetitive for a reason...
View ArticlePokerising Cybersecurity
Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?
View Article