The why, what, how and what next of security policies. Now with a riposte from Phil Huggins who provoked this post and the linked articles by questioning the value of traditional written document sets
The IoT – The terrifying creature from cyberspace. How much of the problem is FUD and how much is poor and rapid development of solutions…a balance to be struck in the interests of clarity
Information security policies this week. Is yours all it’s cracked up to be and what security value is it adding for anyone except lawyers, regulators and auditors?
This week’s tweet-size InfoSec analogy with not so tweet-size extra stuff 🙂 [tweet https://twitter.com/S_Clarke22/status/575685304574738432 hide_thread=true width=’900′] [tweet https://twitter.com/S_Clarke22/status/575558596278288384 hide_thread=true width=’900′] In one resulting twitter conversation you’ll find very pertinent questions from Van Amenya (a non-security person […]
Using the term ‘cyber’ to prefix ‘security’ causes a strong reaction with some professionals. Are furious accusations of quackery justified and could this be the new alternative…
…or Anthem-inspired Amateur Attack Attribution Aid – Back when the Anthem breach was first being discussed (FUDdified) on Twitter, I spotted an informed, good humored, if slightly weary sounding exchange…
Wednesday Wee One, or tweet-size InfoSec analogy, or #Analogette So I squeaked in on the deadline this time. Got the tweet out this morning, but got distracted and forgot to post it […]
How utterly chuffed am I!
A panel of industry experts, including editors from SC and InfoSecurity magazines, shortlisted blogs for the 2015 Social Security Blogger Awards. If you blog, podcast or publish security content and like Infospectives here’s how to vote 🙂