A double dose of what we hope is the security obvious. What do you think when someone calls a system 100% hack proof? And are all pen tests created equal?
This started life as a couple of peeves about security ‘expertise’, but it’s grown to include a few things I think do our trade no good. Am I moaning about the inevitable, or calling out […]
When it comes to cyber, information, IT (or whatever you choose to prefix it with) security, where do you draw a compliant and cost-effective line? Where, between gold-plated and the status quo, is good enough?
The why, what, how and what next of security policies. Now with a riposte from Phil Huggins who provoked this post and the linked articles by questioning the value of traditional written document sets
With a dramatic increase in cyber security legislation and regulation brewing, how is that relationship with regulators going? Is it positive and productive or divisive and dictatorial?
The IoT – The terrifying creature from cyberspace. How much of the problem is FUD and how much is poor and rapid development of solutions…a balance to be struck in the interests of clarity
Information security policies this week. Is yours all it’s cracked up to be and what security value is it adding for anyone except lawyers, regulators and auditors?
….its the all new Trustwave Security Pressures Report. Last year 80% IT pros felt pressure to deliver insecure IT solutions. What’s changed?