Working out why handling of the upgrade made me so grumpy and how we hand over so much control to big vendors.
This con is the first thing I’ve experienced that effectively challenges the discomfort ‘security suits’ can feel when mixing with hackers. I was told that would be the case, but you have to see […]
Blockchains are tackling the ‘I’ in the holy InfoSec CIA trinity more simply and robustly than anything that’s gone before, but can we grasp this well enough to avoid expensive purchasing and security mistakes?
When CNN published their “Superhero Hacker” series it kicked off on Twitter. While the circumstantial truths and skills of those featured are indisputable, the bigger question of enduring stereotypes came to the fore. […]
Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.
A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if […]
Maria Korolov, writing for CIO Online, summarised key findings from (ISC)2’s recent report on Women In Security. A report informed by the their 2015 Global Information Security Workforce Study. The standout figure? […]
IoTing ‘things’ is not the problem. It’s the lack of good security in worlds where ‘things’ are made and used. A post inspired by one Dave Waterson (Founder and CEO of SentryBay) published on LinkedIn […]