In a complex and changing world, we as humans need to be flexible and constantly changing to cope with new circumstances. Jason Cowling argues that effective security environments need to be viewed in the same way in order to cope with a fluid threat landscape.
Richard Jones dusts off his tools and looks at how DIY in the home and the DIY approach to security can both lead to issues.
Learning to play an instrument takes a lot of hard work and time. David Scovetta looks at what we can learn from this process when developing our own security practices.
Michael Cole analyses the strategies employed by American Football teams to see if they can help us better defend our networks
Andy Jones takes a look at what Scrabble can teach us about password security
This is the Romanian translation of an analogy originally posted on the 26th February. After spending a lot of time describing Romania to people, Alina Stancu looks at how InfoSec itself can be compared to a country in terms of it’s language, customs and cultures.
The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...
The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...
Some people are lucky enough to live somewhere quiet, maybe in a village, or at the end of a suburban cul-de-sac. If so, their children may have the kind of freedom I enjoyed; Riding bikes in ...
One thing up front: This is not, in case you were hoping, an attempt at adult InfoSec fiction. Rather, it should resonate with anyone using, or planning to use cloud solutions and anyone who’s seen or ...
The increasing sophistication of technology makes it hard for IT professionals to keep up and be experts in all things technology. From monolithic central IT systems through to new and distributed computing models, it’s harder—and ...
Whilst I appreciate that we are not all lovers of what is often described as the ‘beautiful game’, most of us understand the principles of football or any other team sport for that matter. Whilst ...
Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks
Reversing climate change is a difficult longterm challenge. Angus McIlwraith explores how changing cultural attitudes towards security can be equally complex.
What do you expose? What can your own image teach you about secure cloud usage choices? Sarah Clarke looks at how choosing a cloud solution mirrors the tightrope celebrities must navigate to control their personal brand.
It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.
Laura Vivet explores Privacy Policies and looks at why the one size fits all model isn’t fit for purpose.
Sarah Clarke looks at the pain and inconvenience a lost phone can cause to highlight some of the challenges facing information security risk and incident management.