When CNN published their “Superhero Hacker” series it kicked off on Twitter. While the circumstantial truths and skills of those featured are indisputable, the bigger question of enduring stereotypes came to the fore. […]
How fantastic is this – another award nomination! By no means complacent about this sort of fabulous recognition for what I do, so thank you giantly to whoever kindly nominated Infospectives. Below (the […]
Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.
Far too many do far too little to assess and govern 3rd party security…it’s time for that to change.
Just noticed the date in time to send a late message to bodies across the pond I’m lucky enough to know. Here’s to you, all the good going on over there, and […]
IBM says cybercrime is the greatest threat you will face…but how do you know the scale and likelihood of fallout for your business and decide whether tools really are the answer?
A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if […]
First of what may turn into a series of GRC day job related posts. Here I’m highlighting challenges for anyone involved with system security audits or assessments. This isn’t about merits of various […]