Finding The Hidden InfoSec Story

Mission

Find out more about the origins of The Analogies Project, and how we’re helping to spread the Information Security message

Click here to read more

Literature Initiative

Explore the hidden information security analogies we’ve uncovered within our Literature Initiative.

Click here to read more

Event Support

We can offer you variety of support both within your organisation and at events and conferences.

Click here to read more

Patrons & Partners


  • RECENT
  • POPULAR
  • SHARED

Infosec Lessons Learned From Trying To Keep Rabbits Inside Their Garden Cage

Claus Houmann talks about pentesting and the ingenuity rabbits suddenly develop when faced with fences, like hackers faced with secure information.

The Perils of Self-Publishing

Slava Gomzin writes about DIY quick solutions versus the security of working with a team, as well as the importance of using assigned roles within a team.

IT Security As The Body

Siren Hofvander writes about the many similarities there are between our own harmonious biology and harmonious security systems.

The Very Model of an Information Officer

Ross Moore offers a semi-musical tribute to Information Officers everywhere.

Плацебо Eфекат у NнформационoЈ Безбедности

This is the Serbian Cyrillic translation of an analogy originally posted on the 11th of April, 2016. Zoran Lalic encourages us to ask whether the security tools we’ve implemented are just placebos to make us feel better.

A Child’s View

Vaune Carr draws some parallels between the ever-changing world of child rearing and the ever-changing environment of information security.

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...

What the Elizabethans Teach us About Cyber-Security

What the Elizabethans Teach us About Cyber-Security

The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...

Jurassic Park – Based on a True Story…

Jurassic Park – Based on a True Story…

Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company.  I was instructed to prepare a 10 minute presentation on ...

God Save Me From My Friends. I Can Protect Myself From My Enemies

God Save Me From My Friends. I Can Protect Myself From My Enemies

This quote is attributed to many. In fact, most people believe it was first said by King David himself. Some attribute to the French philosopher Voltaire, and others to the French marshal Claude Louis Hector ...

Cleavage and Clouds

Cleavage and Clouds

One thing up front: This is not, in case you were hoping, an attempt at adult InfoSec fiction. Rather, it should resonate with anyone using, or planning to use cloud solutions and anyone who’s seen or ...

Romeo & Juliet

Romeo & Juliet

In this famous play by Shakespeare Juliet, in an attempt to avoid an arranged marriage politically motivated to Paris, visits Friar Laurence for help. The Friar suggests to her a drug that will put her ...

What the Elizabethans Teach us About Cyber-Security

Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks

People Hacking & Playtime

Could placing more trust in our employees create more secure businesses? Sarah Clarke looks at the balance of freedom and restrictions we place on our children and compares this to our employees.

God Save Me From My Friends. I Can Protect Myself From My Enemies

It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.

Don’t Forget to Lock the Door

Are you in danger of locking the stable door after the digital horse has bolted? Leandro Bennaton looks at how we need to take the mindset of physical precautions into the digital realm.

Hotel Stories

Sarah Clarke uses an embarrassing hotel experience to explore incident management and how it could have helped the situation

Privacy Policy Should Fit Like a Glove

Laura Vivet explores Privacy Policies and looks at why the one size fits all model isn’t fit for purpose.