Blockchains are tackling the ‘I’ in the holy InfoSec CIA trinity more simply and robustly than anything that’s gone before, but can we grasp this well enough to avoid expensive purchasing and security mistakes?
Practical InfoSec & Privacy * FUD fighting * Straddling security and data protection * Calling on IT, ITSec, InfoSec, and GRC experience to reduce data related harm * Blogging about helpful stuff for companies and the general public
When CNN published their “Superhero Hacker” series it kicked off on Twitter. While the circumstantial truths and skills of those featured are indisputable, the bigger question of enduring stereotypes came to the fore. […]
Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.
A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if […]
Maria Korolov, writing for CIO Online, summarised key findings from (ISC)2’s recent report on Women In Security. A report informed by the their 2015 Global Information Security Workforce Study. The standout figure? […]
IoTing ‘things’ is not the problem. It’s the lack of good security in worlds where ‘things’ are made and used. A post inspired by one Dave Waterson (Founder and CEO of SentryBay) published on LinkedIn […]