Finding The Hidden InfoSec Story

Mission

Find out more about the origins of The Analogies Project, and how we’re helping to spread the Information Security message

Click here to read more

Literature Initiative

Explore the hidden information security analogies we’ve uncovered within our Literature Initiative.

Click here to read more

Event Support

We can offer you variety of support both within your organisation and at events and conferences.

Click here to read more

Patrons & Partners

slide 1
Image Slide 1
Image Slide 2
Image Slide 3

  • RECENT
  • POPULAR
  • SHARED

If the rats are after your cheese, keep the cheese safe

Jason Ha explores how can we prevent hackers from taking a bite out of our assets.

Is Your Security Framework Like a Smooth Saloon Car or a 4X4?

If we took the same approach to building a car as we did to our organisational controls and capabilities what would be the result? Jason Ha takes a look under the bonnet.

Waiting for Godot and a Data Breach

Indy Dhami joins Estragon and Vladimir and looks at what Waiting for Godot can teach us about the attitudes companies should adopt towards security threats

Lessons From the Pit Lane

Anne Wood takes inspiration from Formula 1, and discusses how understanding our environments is crucial to having the winning infosec strategy.

Digital Vampires

Dixie Newman lifts the coffin lid on the vampire, and how they can hunt and feed upon us in the digital world too.

The importance of the captain’s log…

How can we ensure our IT management is smooth sailing? Emmanuel Nicaise sails the infosec sea and considers how to steer clear of stormy weather.

Jurassic Park – Based on a True Story…

Jurassic Park – Based on a True Story…

Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company.  I was instructed to prepare a 10 minute presentation on ...

Lessons from the Big Four – Shakespeare’s Tragic Heroes

Lessons from the Big Four – Shakespeare’s Tragic Heroes

I don’t know if the phrase “the bigger they come, the harder they fall” was around when Shakespeare was alive but it applies to his tragic heroes across the board. If we look at his ...

God Save Me From My Friends. I Can Protect Myself From My Enemies

God Save Me From My Friends. I Can Protect Myself From My Enemies

This quote is attributed to many. In fact, most people believe it was first said by King David himself. Some attribute to the French philosopher Voltaire, and others to the French marshal Claude Louis Hector ...

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...

Don’t Walk on the Grass!

Don’t Walk on the Grass!

In a vain bid to keep fit, I go running. Sometimes. When the mood takes me. It’s one of those things that I know I should do - I understand the importance of exercise, but ...

Romeo & Juliet

Romeo & Juliet

In this famous play by Shakespeare Juliet, in an attempt to avoid an arranged marriage politically motivated to Paris, visits Friar Laurence for help. The Friar suggests to her a drug that will put her ...

The Unique Mark Of The Signet

The Signet ring was used for authentication and identification purposes. Javvad Malik discusses just how else these iconic symbols can they relate to modern Information Security practises.

Desert Island Security Controls

Dr Daniel Dresner ponders what top 8 controls for a secure business he’d take with him if trapped on a desert island.

Seven Unwise Monkeys

Are humans really any wiser than monkeys? Angus McIlwraith looks at the role legacy and inertia play in defining company policy.

The Ghostly Side of Bug-Hunting

Fresh from looking for things that go bump in the night, Stuart Coulson encourages us to use the procedures and tools from ghost hunting to improve our risk incident responses.

Find Me Those Plans….

Adrian Davis takes a look at Star Wars and what lessons we can learn from the theft of those Death Star plans…

Actele de Caritate şi Securitatea Informaţiei Nu Se Limitează la Acreditare

This is the Romanian version of ‘Has CSR Been Reduced to Compliance-Only? Should Security Be?’ published on June 1st 2015. More than a box ticking exercise? Alina Stancu argues that real information security practice is a lot more than a simple compliance policy.