Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.
Far too many do far too little to assess and govern 3rd party security…it’s time for that to change.
Just noticed the date in time to send a late message to bodies across the pond I’m lucky enough to know. Here’s to you, all the good going on over there, and […]
IBM says cybercrime is the greatest threat you will face…but how do you know the scale and likelihood of fallout for your business and decide whether tools really are the answer?
A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if […]
Maria Korolov, writing for CIO Online, summarised key findings from (ISC)2’s recent report on Women In Security. A report informed by the their 2015 Global Information Security Workforce Study. The standout figure? […]
IoTing ‘things’ is not the problem. It’s the lack of good security in worlds where ‘things’ are made and used. A post inspired by one Dave Waterson (Founder and CEO of SentryBay) published on LinkedIn […]
First of what may turn into a series of GRC day job related posts. Here I’m highlighting challenges for anyone involved with system security audits or assessments. This isn’t about merits of various […]