Jack Matthews describes how the ransomware industry works and what you can do to protect yourself.
Claus Houmann and J. Wolfgang Goerlich describe what we can learn from tower defence games when adapting info security to today’s attacks, hacks and breaches.
Ross Moore uses Damocles and Dionysius to describe the double-edged threats we face in protecting our customers’ data.
This is the Polish translation of a French analogy originally posted on the 30th of July 2015. Fabrice de Paepe says looking for wild mushrooms, much the same as public Wi-Fi networks, can be very useful but may also harbour dangers for the unwary.
Will Pelgrin writes about the creativity that comes from a disorderly, organic approach to business and security.
Dave Brooks compares the sense of panic that has spread in the UK as a result of the EU Referendum with the dread that follows an InfoSec breach.
This quote is attributed to many. In fact, most people believe it was first said by King David himself. Some attribute to the French philosopher Voltaire, and others to the French marshal Claude Louis Hector ...
The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...
Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company. I was instructed to prepare a 10 minute presentation on ...
The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...
In this famous play by Shakespeare Juliet, in an attempt to avoid an arranged marriage politically motivated to Paris, visits Friar Laurence for help. The Friar suggests to her a drug that will put her ...
One thing up front: This is not, in case you were hoping, an attempt at adult InfoSec fiction. Rather, it should resonate with anyone using, or planning to use cloud solutions and anyone who’s seen or ...
Are you in danger of locking the stable door after the digital horse has bolted? Leandro Bennaton looks at how we need to take the mindset of physical precautions into the digital realm.
Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks
Could placing more trust in our employees create more secure businesses? Sarah Clarke looks at the balance of freedom and restrictions we place on our children and compares this to our employees.
It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.
Zoran Lalic encourages us to ask whether the security tools we’ve implemented are effectively inoculating against hackers, or whether they are just placebos to make us feel better.
Sarah Clarke uses an embarrassing hotel experience to explore incident management and how it could have helped the situation