The why, what, how and what next of security policies. Now with a riposte from Phil Huggins who provoked this post and the linked articles by questioning the value of traditional written document sets
With a dramatic increase in cyber security legislation and regulation brewing, how is that relationship with regulators going? Is it positive and productive or divisive and dictatorial?
The IoT – The terrifying creature from cyberspace. How much of the problem is FUD and how much is poor and rapid development of solutions…a balance to be struck in the interests of clarity
Information security policies this week. Is yours all it’s cracked up to be and what security value is it adding for anyone except lawyers, regulators and auditors?
Breaking News Tuesday 6th October: The European Court of Justice Strikes Down The Safe Harbor Agreement The decision as reported by Politico telling us there will be an official announcement at 3pm. Quoting […]
This week’s tweet-size InfoSec analogy with not so tweet-size extra stuff 🙂 [tweet https://twitter.com/S_Clarke22/status/575685304574738432 hide_thread=true width=’900′] [tweet https://twitter.com/S_Clarke22/status/575558596278288384 hide_thread=true width=’900′] In one resulting twitter conversation you’ll find very pertinent questions from Van Amenya (a non-security person […]
Using the term ‘cyber’ to prefix ‘security’ causes a strong reaction with some professionals. Are furious accusations of quackery justified and could this be the new alternative…
…or Anthem-inspired Amateur Attack Attribution Aid – Back when the Anthem breach was first being discussed (FUDdified) on Twitter, I spotted an informed, good humored, if slightly weary sounding exchange…