The new kid on the block - COIN
AssuranceBiometricsCybersecurityGRCIdentity ManagementInformation AssuranceMobilityRisk ManagementVulnerability Management As security professionals, you can be forgiven for thinking that we are...
View ArticleSecurity tenets for potential recruits
Information AssuranceRisk ManagementSecurity ArchitectureOne of my current responsibilities is looking after the recruitment of new professionals into our security practice. I’m therefore well-placed...
View ArticleAgile as an overloaded term
1Information AssuranceRisk ManagementSecurity StrategyI’m hearing the word “Agile” a lot. For example, the Government Digital Services (GDS) team within the Cabinet Office are heavily pushing Agile...
View ArticleYou can't secure "the Cloud"
Cloud ComputingRisk ManagementSecurity ArchitectureThe “cloud” term remains badly overloaded. Facebook is cloud. Amazon Web Services is cloud. Salesforce.com is cloud. Your virtualised data centre...
View ArticleThe mythical magical security technology solution
CybersecurityInformation AssuranceRisk ManagementSecurity ArchitectureSecurity has always been an area prone to the purchase of snake-oil. Security is viewed as a black-art by those outside of our...
View ArticleCloud, Data Sovereignty and Spies
Cloud ComputingCybersecurityRisk ManagementSecurity StrategyThe Snowden revelations regarding the activities of the NSA (and other agencies) have long been assumed to be damaging to the on-going...
View ArticleGuess what your threats are and see how that helps...
AssuranceCloud ComputingComplianceCybercrimeCybersecurityData ProtectionDLPGRCInformation AssuranceMobilityNetwork SecurityPrivacyRisk ManagementSecurity ArchitectureSecurity StrategySecurity...
View ArticleExploring Identity; it's more interesting than you may think.
CybersecurityIdentity ManagementPrivacyRisk ManagementNow, discussions of identity can rapidly descend into unproductive philosophy. But at the same time it is important that we all have an...
View ArticleMonitoring the value of security
GRCRisk ManagementSecurity StrategyInformation security has long suffered a poor reputation for being an expensive overhead with no real business benefit. Of course, we security practitioners are...
View ArticleBe more analogue
Risk ManagementI’m old. I admit it. I have a record player and some vinyl records. I like it. I know that there are many ways to make it sound better, but it sounds good enough to me. I also know that...
View Article
More Pages to Explore .....