Jason Ha explores how can we prevent hackers from taking a bite out of our assets.
If we took the same approach to building a car as we did to our organisational controls and capabilities what would be the result? Jason Ha takes a look under the bonnet.
Indy Dhami joins Estragon and Vladimir and looks at what Waiting for Godot can teach us about the attitudes companies should adopt towards security threats
Anne Wood takes inspiration from Formula 1, and discusses how understanding our environments is crucial to having the winning infosec strategy.
Dixie Newman lifts the coffin lid on the vampire, and how they can hunt and feed upon us in the digital world too.
How can we ensure our IT management is smooth sailing? Emmanuel Nicaise sails the infosec sea and considers how to steer clear of stormy weather.
Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company. I was instructed to prepare a 10 minute presentation on ...
This quote is attributed to many. In fact, most people believe it was first said by King David himself. Some attribute to the French philosopher Voltaire, and others to the French marshal Claude Louis Hector ...
I don’t know if the phrase “the bigger they come, the harder they fall” was around when Shakespeare was alive but it applies to his tragic heroes across the board. If we look at his ...
The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...
In this famous play by Shakespeare Juliet, in an attempt to avoid an arranged marriage politically motivated to Paris, visits Friar Laurence for help. The Friar suggests to her a drug that will put her ...
– for Information Systems and Divers The Deming cycle (Plan - Do - Check - Act) forms the foundation of continual improvement principles in a wide range of management systems such as ISO9001, ISO20000, ISO22301, ISO27000,… The ...
Andrew Rose explains why security awareness doesn’t always equal a change in user behaviour, and the 3 aspects that will help create security programs that do.
As Tom Fairfax has found, people are the key to effective Information Security Management, but what’s the simplest way to categorise them according to their abilities?
It’s all very well trying to change other people’s behaviour but perhaps you should consider what you could do differently instead. Mo Amin tells us how a short spell in Spain changed his whole outlook on teaching
Ron Condon looks at Aesop’s Fable ‘The Boy Who Cried Wolf’ and draws parallels to the threats modern day organisations face and how these are reported to the board
Anyone can sail, but a good sailor is someone who can respond to everything the sea throws at them. Laura Vivet looks at how preparation and having the right systems in place, not only affect the fortunes of the seafarer but can be compared to Cloud Service Providers.
From piracy on the high seas to today’s battles online. Claus Houmann looks at how the battlefield may have changed, but what about the rules of engagement?