Quantcast
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Scaling Vendor And Project Security Risk – Are you going to assess them all?

Are you seriously going to ask your milkman the same security questions as your network hosting partner? Of course not. But between those extremes, companies have a world of pain working out how much...

View Article


Image may be NSFW.
Clik here to view.

How Much Security Is Enough? Part 1

When it comes to cyber, information, IT (or whatever you choose to prefix it with) security, where do you draw a compliant and cost-effective line? Where, between gold-plated and the status quo, is...

View Article


Image may be NSFW.
Clik here to view.

When All Attempts At InfoSec Education Fail…

If it's not making sense in technical, business, risk or finance language and there's little reaction to endless news of giant data breaches, perhaps it's time to get creative

View Article

Image may be NSFW.
Clik here to view.

Schrödinger’s Risk

Just like Schrödinger and his quantum feline, most companies are just making assumptions about the state of their cybersecurity risks.

View Article

Image may be NSFW.
Clik here to view.

Why Isn’t The Cyber World Burning?

The interweb says it should be. Every day, in every way, it’s getting FUDdier: Cyberterrorists, Cyberespionage, Cybercriminals, Cyberbogeymen. Cybercars, Cyberheating, Cybercyber. By rights nothing...

View Article


Image may be NSFW.
Clik here to view.

Ohhhhh P M

My contribution to the reams written about the catastrophic OPM breach. Born out of weariness and the realisation that cybersecurity breach related news is sometimes repetitive for a reason...

View Article

Image may be NSFW.
Clik here to view.

Pokerising Cybersecurity

Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?

View Article

Image may be NSFW.
Clik here to view.

A Rash Of #InfoSec #Analogettes

A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if […]

View Article


Image may be NSFW.
Clik here to view.

VTech Breach -Data, Data Everywhere

Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.

View Article


Image may be NSFW.
Clik here to view.

Data Breach Grief & Bringing Incident Response Brooms To Gunfights

Breaches hurt, incident management is a strategic security priority, and legal notification requirements are ramping up. But how does that translate into action, and are firms learning from mistakes?

View Article

Image may be NSFW.
Clik here to view.

The Cybersecurity Prayer

A little irreverent levity for beleaguered security pros everywhere: The Cybersecurity Prayer Our metadata, that art in clouds, cyber attack fodder be thy name… Thy nation state be backing, thy...

View Article

Image may be NSFW.
Clik here to view.

When Mum’s LinkedIn Password Is Nicked

Part of the Infospectives Diary Of An InfoSec Kid series. Originally written about the Kiddicare hack, but now 117 Million LinkedIn usernames and passwords have been found for sale on the darknet The...

View Article

Image may be NSFW.
Clik here to view.

UPDATED: Swift Financial System Breaches…or far more mundane failings?

In mid May we found out the Bank of Bangladesh lost a reported $81m when crooks managed to fraudulently redirect funds to shady recipients via the Swift international money transfer system. Then we […]

View Article


Image may be NSFW.
Clik here to view.

The Cybersecurity Prayer

A little irreverent levity for beleaguered security pros everywhere: The Cybersecurity Prayer Our metadata, that art in clouds, cyber attack fodder be thy name… Thy nation state be backing, thy...

View Article

Pokerising Cybersecurity

Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?

View Article


Frozen: The InfoSec Remix…

Re-relased for Christmas 2015 the original Infospectives InfoSec Karaoke. Are you a security songstress? We'd love to hear your version.

View Article

Schrödinger's Risk

Just like Schrödinger and his quantum feline, most companies are just making assumptions about the state of their cybersecurity risks.

View Article


Why Isn't The Cyber World Burning?

The interweb says it should be. Every day, in every way, it’s getting FUDdier: Cyberterrorists, Cyberespionage, Cybercriminals, Cyberbogeymen. Cybercars, Cyberheating, Cybercyber. By rights nothing...

View Article

Ohhhhh P M

My contribution to the reams written about the catastrophic OPM breach. Born out of weariness and the realisation that cybersecurity breach related news is sometimes repetitive for a reason...

View Article

Pokerising Cybersecurity

Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?

View Article
Browsing all 25 articles
Browse latest View live