Quantcast
Channel: RSS feed for this search
Browsing latest articles
Browse All 21 View Live

Image may be NSFW.
Clik here to view.

The new kid on the block - COIN

AssuranceBiometricsCybersecurityGRCIdentity ManagementInformation AssuranceMobilityRisk ManagementVulnerability Management As security professionals, you can be forgiven for thinking that we are...

View Article



Image may be NSFW.
Clik here to view.

Security tenets for potential recruits

Information AssuranceRisk ManagementSecurity ArchitectureOne of my current responsibilities is looking after the recruitment of new professionals into our security practice.  I’m therefore well-placed...

View Article

Image may be NSFW.
Clik here to view.

Agile as an overloaded term

1Information AssuranceRisk ManagementSecurity StrategyI’m hearing the word “Agile” a lot.  For example,  the Government Digital Services (GDS) team within the Cabinet Office are heavily pushing Agile...

View Article

Image may be NSFW.
Clik here to view.

You can't secure "the Cloud"

Cloud ComputingRisk ManagementSecurity ArchitectureThe “cloud” term remains badly overloaded.   Facebook is cloud.  Amazon Web Services is cloud.  Salesforce.com is cloud.  Your virtualised data centre...

View Article

Image may be NSFW.
Clik here to view.

The mythical magical security technology solution

CybersecurityInformation AssuranceRisk ManagementSecurity ArchitectureSecurity has always been an area prone to the purchase of snake-oil.   Security is viewed as a black-art by those outside of our...

View Article


Image may be NSFW.
Clik here to view.

Cloud, Data Sovereignty and Spies

Cloud ComputingCybersecurityRisk ManagementSecurity StrategyThe Snowden revelations regarding the activities of the NSA (and other agencies) have long been assumed to be damaging to the on-going...

View Article

Image may be NSFW.
Clik here to view.

Guess what your threats are and see how that helps...

AssuranceCloud ComputingComplianceCybercrimeCybersecurityData ProtectionDLPGRCInformation AssuranceMobilityNetwork SecurityPrivacyRisk ManagementSecurity ArchitectureSecurity StrategySecurity...

View Article

Image may be NSFW.
Clik here to view.

Exploring Identity; it's more interesting than you may think.

CybersecurityIdentity ManagementPrivacyRisk ManagementNow, discussions of identity can rapidly descend into unproductive philosophy.  But at the same time it is important that we all have an...

View Article


Image may be NSFW.
Clik here to view.

Monitoring the value of security

GRCRisk ManagementSecurity StrategyInformation security has long suffered a poor reputation for being an expensive overhead with no real business benefit.   Of course, we security practitioners are...

View Article


Image may be NSFW.
Clik here to view.

Be more analogue

Risk ManagementI’m old. I admit it. I have a record player and some vinyl records. I like it. I know that there are many ways to make it sound better, but it sounds good enough to me. I also know that...

View Article
Browsing latest articles
Browse All 21 View Live




Latest Images