Finding The Hidden InfoSec Story

Mission

Find out more about the origins of The Analogies Project, and how we’re helping to spread the Information Security message

Click here to read more

Initiatives

Keep up to date with our current initiatives and plans for the future.

Click here to read more

Event Support

We can offer you variety of support both within your organisation and at events and conferences.

Click here to read more

Contributing

Interested in writing Analogies or helping to promote the project?

Click here to read more


  • RECENT
  • POPULAR
  • SHARED

Security on a Plate

Is there really such a thing as a perfect dish? Jeffrey Borbón Sanabria looks at how preparing good food has a lot in common with good security, but it’s down to personal taste.

Infosec? What country is that?

After spending a lot of time describing Romania to people, Alina Stancu looks at how InfoSec itself can be compared to a country in terms of it’s language, customs and cultures.

Cake and Security

One of the keys to a healthy body is maintaining a healthy diet. Leron Zinatullin looks at how if we take a similar approach to security it can result in a healthier organisation.

Common Ingredients In Gastronomy and Information Security

Jeffrey Borbón Sanabria looks at the difficulties around recreating successful recipes and asks if the same is true with the implementation of InfoSec within businesses

Risk Management on the Ski Slopes

Skiing is far from a risk free sport. Kiera Lillie looks at the steps we need to take to ensure we stay safe on the slopes and how this equates to risk management within our businesses.

El teu proveïdor Cloud és un bon mariner?

This is the Catalan translation of an analogy originally posted on the 22nd December 2014. Anyone can sail, but a good sailor is someone who can respond to everything the sea throws at them. Laura Vivet looks at how preparation and having the right systems in place, not only affect the fortunes of the seafarer but can be compared to Cloud Service Providers.

What the Elizabethans Teach us About Cyber-Security

What the Elizabethans Teach us About Cyber-Security

The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...

People Hacking & Playtime

People Hacking & Playtime

Some people are lucky enough to live somewhere quiet, maybe in a village, or at the end of a suburban cul-de-sac.  If so, their children may have the kind of freedom I enjoyed; Riding bikes in ...

Cleavage and Clouds

Cleavage and Clouds

One thing up front: This is not, in case you were hoping, an attempt at adult InfoSec fiction. Rather, it should resonate with anyone using, or planning to use cloud solutions and anyone who’s seen or ...

What’s that Plumber Doing in the Bedroom?

What’s that Plumber Doing in the Bedroom?

The increasing sophistication of technology makes it hard for IT professionals to keep up and be experts in all things technology.  From monolithic central IT systems through to new and distributed computing models, it’s harder—and ...

Cyber Security: A Beautiful Game?

Cyber Security: A Beautiful Game?

Whilst I appreciate that we are not all lovers of what is often described as the  ‘beautiful game’, most of us understand the principles of football or any other team sport for that matter. Whilst ...

What the Elizabethans Teach us About Cyber-Security

Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks

Not At The Flick of a Switch

Reversing climate change is a difficult longterm challenge. Angus McIlwraith explores how changing cultural attitudes towards security can be equally complex.

Cleavage and Clouds

What do you expose? What can your own image teach you about secure cloud usage choices? Sarah Clarke looks at how choosing a cloud solution mirrors the tightrope celebrities must navigate to control their personal brand.

God Save Me From My Friends. I Can Protect Myself From My Enemies

It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.

Privacy Policy Should Fit Like a Glove

Laura Vivet explores Privacy Policies and looks at why the one size fits all model isn’t fit for purpose.

Ever Lost Your Phone?

Sarah Clarke looks at the pain and inconvenience a lost phone can cause to highlight some of the challenges facing information security risk and incident management.