Finding The Hidden InfoSec Story

The North Wind and The Sun
Jul13

The North Wind and The Sun

Dave Brooks looks at Aesop’s ‘The North Wind and The Sun’ and looks at whether the wind or the sun present the best technical hack.

Read More
Cymbeline
Jul10

Cymbeline

With issues around identity and authenticity Dave Brooks explores what Shakespeare’s ‘Cymbeline’ can tell us about phishing.

Read More
The Wolf, the She-Goat and the Kid
Jul09

The Wolf, the She-Goat and the Kid

Paul Farmer explores the security parallels between Aesop’s ‘The Wolf, the She-Goat, and the Kid’ with those of modern day practices.

Read More
The Shoes that were Danced to Pieces
Jul08

The Shoes that were Danced to Pieces

In the tale ‘The Shoes that were Danced to Pieces’ by the Brothers Grimm, a King seeks to solve the mystery of what’s happening to his 12 daughters shoes at night. Dave Brooks looks at the lessons we can learn from their plight.

Read More
Lessons from the Big Four – Shakespeare’s Tragic Heroes
Jul07

Lessons from the Big Four – Shakespeare’s Tragic Heroes

Jenny Radcliffe looks at Shakespeare’s central characters Hamlet, Macbeth, Othello and King Lear and asks what these tragic heroes can teach us about Information Security.

Read More
The Sheep Biter – Insider Threat in Fable
Jul06

The Sheep Biter – Insider Threat in Fable

Is the real threat the one from within? Paul Farmer looks at Aesop’s fable ‘The Sheep Biter’ for answers.

Read More