Steve Pomfret takes a shot at how James Bond’s modus operandi can improve our approach to info security.
Jeffrey Borbón Sanabria ponders why we carefully consider how to balance our diet to be healthy, and draws parallels with the measures we take to secure our data.
Who wouldn’t want to find a winning recipe for information security? Dave Brooks thinks a baking contest has more to do with InfoSec than just a Technical Challenge.
Steve Pomfret inspires us with the story of a gold medal-winning athlete, and reflects on how CISO work requires us to train teams of sprinters and marathon runners – or cross-train ourselves.
Ross Moore tells us a tale of Knights and Giants. In the infosec world, giants attack in unexpected ways. Holding the gates might be the most rewarding way to protect your castle.
Dave Brooks looks at the infamous Shakespeare character Shylock and what we should look out for in our dealings with contracts.
The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...
The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...
Some people are lucky enough to live somewhere quiet, maybe in a village, or at the end of a suburban cul-de-sac. If so, their children may have the kind of freedom I enjoyed; Riding bikes in ...
Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company. I was instructed to prepare a 10 minute presentation on ...
One thing up front: This is not, in case you were hoping, an attempt at adult InfoSec fiction. Rather, it should resonate with anyone using, or planning to use cloud solutions and anyone who’s seen or ...
Looking after a network is like being a gardener. A garden comprises of different plant types in the same way as an organisation has different types of employees. For example: evergreen plants are like permanent staff seasonal plants ...
Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks
Could placing more trust in our employees create more secure businesses? Sarah Clarke looks at the balance of freedom and restrictions we place on our children and compares this to our employees.
What do you expose? What can your own image teach you about secure cloud usage choices? Sarah Clarke looks at how choosing a cloud solution mirrors the tightrope celebrities must navigate to control their personal brand.
It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.
Are you in danger of locking the stable door after the digital horse has bolted? Leandro Bennaton looks at how we need to take the mindset of physical precautions into the digital realm.
Laura Vivet explores Privacy Policies and looks at why the one size fits all model isn’t fit for purpose.