This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest blog posts

The information security implications of change

The information security implications of change

Microsoft has recently warned businesses that they should be well on the way to upgrading their legacy desktop environments.

The beginning of the authentication ice age

The beginning of the authentication ice age

This week I was invited to sign the new online Petition Against Passwords which I was delighted to do and I urge you all to do the same.

The chilling effects of the Volkswagen injunction on British research

The chilling effects of the Volkswagen injunction on British research

At this week's Black Hat conference in Las Vegas, Charlie Miller and Chris Valasek will present on on-board car computer insecurities to thousands.

Information risk: what can businesses learn from each other?

Information risk: what can businesses learn from each other?

Well-managed information has become a precious business asset.

Do you know who is looking at your data?

Do you know who is looking at your data?

Given the current anti-EU sentiment gripping certain shires of England, it might not be fashionable to highlight the positive role that the EU plays in setting the regulatory framework for certain aspects of business behaviour and personal rights.

Would you like an eat to bite?

At the time of writing I'm not sure if Edward Snowden is still sitting in a Moscow transfer lounge or settling in to his 'luxury apartment' in a barrio in Venezuela.

The role of the individual in the great game of cyber intelligence

The role of the individual in the great game of cyber intelligence

In the current debate over Edward Snowden, there are two opposing attitudes to consider: the ideology of individualism and the interest in Edward Snowden as an individual.

ISSA chapter meeting looks at regulation and penetration testing

ISSA chapter meeting looks at regulation and penetration testing

The recent ISSA UK event was held aboard the HMS President in London once again, and Fujitsu's James Gosnold reported for SC Magazine on the day.

The lazy attacker

The lazy attacker

Most cyber attackers are likely to use the easiest route in. They're lazy and no different from your run-of-the-mill hijacker who will gladly steal the car of someone who leaves the keys in it.

(ISC)2: 'We constantly look at ways to make our members stronger'

(ISC)2: 'We constantly look at ways to make our members stronger'

Revamping credentials is key to ensuring that they remain inclusive and represent the best people.

EC releases guidelines on locking up cyber criminals

EC releases guidelines on locking up cyber criminals

Upon returning to the office after a couple of days off, I found my inbox bulging at the seams with perspectives on the change in the punishment for cyber crimes across Europe.

Going virtual? Then get the right security tools for the job

Going virtual? Then get the right security tools for the job

In the last few years, virtualisation and cloud computing have transformed the way organisations do their information processing.

Exploit kits for sale on a website near you

Exploit kits for sale on a website near you

Exploit kits are now responsible for the majority of malware infections across the world, representing a serious threat to computing systems and data.

Women in Security mentoring scheme launched

Women in Security mentoring scheme launched

This week I attended the launch of the (ISC)2 Women in Security mentoring scheme, which was previewed here.

Newsletters