Dixie Newman lifts the coffin lid on the vampire, and how they can hunt and feed upon us in the digital world too.
How can we ensure our IT management is smooth sailing? Emmanuel Nicaise sails the infosec sea and considers how to steer clear of stormy weather.
Christina Czeschik weighs up the pros and cons of BYOD, and considers the relative balance between diplomacy and dictatorship.
With security breaches becoming more and more frequent, Jim Seaman explores how to avoid becoming a victim in the great cyber scavenger hunt.
Dr Christina Czeschik compares our reliance on Password Managers with that of using Accountants and asks whether we’re doing the right thing putting our faith in them.
Tom Fairfax takes a look at General Data Protection Regulation and how we can give our security some bite.
This quote is attributed to many. In fact, most people believe it was first said by King David himself. Some attribute to the French philosopher Voltaire, and others to the French marshal Claude Louis Hector ...
The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...
I don’t know if the phrase “the bigger they come, the harder they fall” was around when Shakespeare was alive but it applies to his tragic heroes across the board. If we look at his ...
Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company. I was instructed to prepare a 10 minute presentation on ...
– for Information Systems and Divers The Deming cycle (Plan - Do - Check - Act) forms the foundation of continual improvement principles in a wide range of management systems such as ISO9001, ISO20000, ISO22301, ISO27000,… The ...
The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...
Zoran Lalic encourages us to ask whether the security tools we’ve implemented are effectively inoculating against hackers, or whether they are just placebos to make us feel better.
Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks
With so much clutter both in our homes and in our data, Sian John looks at how best to manage the clean-up.
Could placing more trust in our employees create more secure businesses? Sarah Clarke looks at the balance of freedom and restrictions we place on our children and compares this to our employees.
It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.
Are you in danger of locking the stable door after the digital horse has bolted? Leandro Bennaton looks at how we need to take the mindset of physical precautions into the digital realm.