Blockchains are tackling the ‘I’ in the holy InfoSec CIA trinity more simply and robustly than anything that’s gone before, but can we grasp this well enough to avoid expensive purchasing and security mistakes?
Do we ask and can we answer the question “Why?” when talking about security? Not just for our employers, but for our peers, and our kids? If we can’t or we don’t, […]
Breaches hurt, incident management is a strategic security priority, and legal notification requirements are ramping up. But how does that translate into action, and are firms learning from mistakes?
When CNN published their “Superhero Hacker” series it kicked off on Twitter. While the circumstantial truths and skills of those featured are indisputable, the bigger question of enduring stereotypes came to the fore. […]
Cheryl Biswas @3ncr1pt3d on the huge potential impact linked to indiscriminate and careless data scooping and storage.
Far too many do far too little to assess and govern 3rd party security…it’s time for that to change.
Just noticed the date in time to send a late message to bodies across the pond I’m lucky enough to know. Here’s to you, all the good going on over there, and […]
IBM says cybercrime is the greatest threat you will face…but how do you know the scale and likelihood of fallout for your business and decide whether tools really are the answer?