No T-800 Yet But Turing Test Victory Could Still Have Negative Side Effects

The Turing Test has been passed for the first time by a computer that was able to convince a panel of experts that they were conversing with a human being. The supercomputer completed the test by successfully convincing the judges it was human more than 30% of the time. Running a program called “Eugene Goostman” the […]

Data Breaches Have Minimal Effect On Consumer Attitude Towards Fraud And Privacy

According to a May 2014 survey by idRADAR, the attitude of the general public towards privacy issues and the risks of fraud are still alarmingly poor. A national survey of 313 consumers, taken from a broad range of ages and socio-economic groups, discovered that almost four-fifths had taken no action to protect their privacy or guard […]

Samsung Foresees Smart Smart Society. But Will It Be Secure?

Electrical conglomerate Samsung has a vision for the UK which, if realised, will see the country change from a digital society to a smart one. According to research published by the company, along with the Big Innovation Centre think tank, the UK public are clamouring for new technology that will make their work and home […]

What Can An Allegedly Dumb Facebook-Using Thief Tell Us About Security?

When it comes to securing computers, networks and information you may think that there isn’t much to it. In some respects, you would be quite right too (though the level of training and expertise required to be competent in this area most definitely shouldn’t be underestimated). After all, computers are logical devices and you typically […]

Security Incidents – Don't Forget Your Business Competitors

If you run any kind of business these days then there is a very good chance that you utilise the internet in some way to aid the accomplishment of your corporate objectives. Because of this you should be aware that there are risks inherent with using the web, especially now that stories about data breaches are […]

My first Information Security Conference – SOURCE Conference: Dublin 2014

I attended the two day SOURCE Conference at the Trinity College in Dublin last week (22-23 May), and have now officially stepped into the big bad (read awesome) world of Information Security with this being my first InfoSec conference. (Exciting times ahead!) Launched in 2008 in Boston, Massachusetts (USA) the SOURCE Conference focuses on bridging […]

Are Passwords Being Shared Within Your Organisation?

One security topic that I’ve heard and written a fair bit about recently is that of the password. Its been the primary means of access control for as long as I can remember and its served its purpose reasonably well for much of that time. But it isn’t a perfect solution for protecting computers and […]

Easy To Guess Passwords Have No Place In Your Organisation

Whilst the computers and networks within an organisation undoubtedly need protecting, the weakest point in any security setup can often turn out to be the people who use the system. If you have responsibility for running a network then the amount of technology you employ to protect it will be of little consequence if users […]

You’ve Been Breached. Now What? – Webinar, June 5th – 2pm BST

I will be taking part in a webinar next week hosted by Infosecurity Magazine on You’ve Been Breached. Now What? Here are the details of the event The headlines are full of stories of breach, and information security professionals are beginning to accept that security breaches are a ‘when?’, not an ‘if’.   According to Verizon’s […]