Very unusually for me (being a very busy working Mum of 2) I had two trips away to conferences in the last 2 weeks. The first was RANT and the second was […]
Lessons learned along the way and plans to help you avoid FUD provoked GDPR investment
Part of the Infospectives Diary Of An InfoSec Kid series. Originally written about the Kiddicare hack, but now 117 Million LinkedIn usernames and passwords have been found for sale on the darknet The image links to […]
Blockchains are tackling the ‘I’ in the holy InfoSec CIA trinity more simply and robustly than anything that’s gone before, but can we grasp this well enough to avoid expensive purchasing and security mistakes?
Maria Korolov, writing for CIO Online, summarised key findings from (ISC)2’s recent report on Women In Security. A report informed by the their 2015 Global Information Security Workforce Study. The standout figure? […]
Wild Speculation & IT Transformation – A four-part story of budget cuts, blamestorming, breaches and massive bumps in the road to mature security.
It looks entirely possible you will have ‘adequate’ security dictated by your insurers, so it is your job to understand the risk based yardstick they’re using to define that
There is no such thing as Information Security risk. There are just business risks that have one or more security or IT related causes.
Some time ago Jenny Radcliffe (internationally respected social engineering, people risk, and negotiations expert) asked me to be a guest on her new Human Factor podcast. I was delighted to accept. The result […]
Today @voteleave took down their web content. So, in the interests of understanding a significant record of the Leave position as we work towards Article 50 invocation, I saved some of the […]
82% of boards are concerned about cybersecurity… …and the UK Parliament think your CEO’s salary should be linked to your firm’s cybersecurity… …but who is really accountable? This June 14th CSO Online article says boards […]
In mid May we found out the Bank of Bangladesh lost a reported $81m when crooks managed to fraudulently redirect funds to shady recipients via the Swift international money transfer system. Then we […]