Finding The Hidden InfoSec Story

Mission

Find out more about the origins of The Analogies Project, and how we’re helping to spread the Information Security message

Click here to read more

Literature Initiative

Explore the hidden information security analogies we’ve uncovered within our Literature Initiative.

Click here to read more

Event Support

We can offer you variety of support both within your organisation and at events and conferences.

Click here to read more


  • RECENT
  • POPULAR
  • SHARED

Shylock, and How to Create a Workable Contract

Dave Brooks looks at the infamous Shakespeare character Shylock and what we should look out for in our dealings with contracts.

Pride, Prejudice and Social Engineering

Vicky Clayton looks at how appearances within Jane Austen’s ‘Pride & Prejudice’ can be deceiving and what it can teach us about social engineering.

Security and Golf

As Raj Patel selects his sand-wedge for a tricky bunker shot, he muses about the selection of clubs available to golf players and the parallels we can draw with our own InfoSec tools.

Operation Quicksilver

When US General George Patton led Operation Quicksilver he deceived the Nazis paving the way for the Normandy landings. Stephen Patton looks at the benefits of using similar deceptions to attract hackers and intruders.

Les Open Wifi sont comme des champignons …

It can be great fun, and cheap, going out in the woods to look for wild mushrooms, but only if you know what you are doing. Make a mistake, and you could end up sick or worse. Fabrice de Paepe says it’s much the same with public Wifi networks, which can be very useful but which may also harbour dangers for the unwary.

The Helmsman Needs a Steady Hand

When it comes to keeping the ship on a steady course, a good Helmsman is key. Claus Houmann analyses their role and tries to find their equivalent in modern organisations.

What the Elizabethans Teach us About Cyber-Security

What the Elizabethans Teach us About Cyber-Security

The year is 1586. In the middle of England's Golden Age, Elizabeth I rules alone – confident, and yet in fear. The Tudor dynasty had been secured on the foundations of illegitimacy, intrigue and disloyalty. With ...

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The Elephant and the Six Blind Men: What Does Information Security Mean to You?

The poem “The Blind Men and the Elephant” was written by John Godfrey Saxe (1816-1887). The essence of the poem is that their reactions were: The first felt the side of the elephant and said: It’s ...

People Hacking & Playtime

People Hacking & Playtime

Some people are lucky enough to live somewhere quiet, maybe in a village, or at the end of a suburban cul-de-sac.  If so, their children may have the kind of freedom I enjoyed; Riding bikes in ...

Cleavage and Clouds

Cleavage and Clouds

One thing up front: This is not, in case you were hoping, an attempt at adult InfoSec fiction. Rather, it should resonate with anyone using, or planning to use cloud solutions and anyone who’s seen or ...

Jurassic Park – Based on a True Story…

Jurassic Park – Based on a True Story…

Yes, really!I was recently looking for a change of direction in my information security career and was invited to an interview at a local company.  I was instructed to prepare a 10 minute presentation on ...

Networking in the Garden

Networking in the Garden

Looking after a network is like being a gardener. A garden comprises of different plant types in the same way as an organisation has different types of employees. For example: evergreen plants are like permanent staff seasonal plants ...

What the Elizabethans Teach us About Cyber-Security

Father and Daughter team Jonathan and Juliet Armstrong look at the Tudor use of espionage and what this can tell us about protecting our modern day networks

People Hacking & Playtime

Could placing more trust in our employees create more secure businesses? Sarah Clarke looks at the balance of freedom and restrictions we place on our children and compares this to our employees.

Cleavage and Clouds

What do you expose? What can your own image teach you about secure cloud usage choices? Sarah Clarke looks at how choosing a cloud solution mirrors the tightrope celebrities must navigate to control their personal brand.

God Save Me From My Friends. I Can Protect Myself From My Enemies

It’s often our friends and family that can hurt us the most. Yotam Gutman takes a look at how this often the case within our organisations.

Don’t Forget to Lock the Door

Are you in danger of locking the stable door after the digital horse has bolted? Leandro Bennaton looks at how we need to take the mindset of physical precautions into the digital realm.

Privacy Policy Should Fit Like a Glove

Laura Vivet explores Privacy Policies and looks at why the one size fits all model isn’t fit for purpose.