Counter-Terrorism Cops Pay Home Visit After Work Computer Searches
Bring your Own Device (BYOD) may be all over the news these days but there are still a large number of people who are given a computer by their employer, either to use in the office or to take on the road. Whilst it might be nice to think that the device is then only […]
Speaking at RSA Conference Europe 2013
I am thrilled to say I have been selected to speak at this years RSA Conference Europe which will be held in Amsterdam in October. I am taking part on a panel called “Breach-Aholic Anonymous – What Can We Learn From Data Breaches?”. The other members on the panel are; Dwayne Melançon, CTO, Tripwire, Javvad […]
MP Keith Vaz – "UK Cyber Attack Is Higher Threat Than Nuclear Strike"
When I was growing up I remember watching the news every evening with my parents and one of the stories that seemed to be repeated on a very regular basis was that of CND protesters assembling around the country as they campaigned for nuclear disarmament. Maybe it was because of my age but it seemed […]
Android 4.3 Offers Enhanced Security, Privacy And Parental Controls
Last Wednesday Google confirmed the release of the latest iteration of Android – version 4.3. Whilst that news is of universal appeal to the millions of gadget lovers out there it is also of interest to those who consider the aspects of privacy and security. The Android platform has long been associated with malware. Its […]
Information Security Isn't just About Computers – Be Careful When Talking To Strangers
With the economy how it is and more people having to be in the work force for longer hours it can seem like work is all that you are about. You might have other interests but you spend so much time at work that you do not have time to do them! All you can […]
How Your Ex-Employees Could Be Your Worst Enemy When It Comes To Securing Your Business
When it comes to running a business these days there are many things that you have to make sure that you get right. It does not matter if the business is big or small, there are just certain things that you have to make sure you get right or else you will not be in […]
Incident Response And The Apple Developer Site 'Hack'
How do you rate Apple’s incident response in this situation? Apple disclosed yesterday that its developers website had been temporarily taken down after being ‘hacked’ last Thursday. After three days of suggesting that the developer.apple.com site was down for maintenance Apple later sent an email to developers on Sunday saying that, “Last Thursday, an intruder attempted to […]
ISACA To Update IS Audit And Assurance Standards
ISACA, who offer the well-known Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) certifications, have announced the introduction of revised Information Systems (IS) Audit and Assurance Standards. The new standards have been restructured in order to yield […]
Ponemon Study Shows Security Metrics May Not Be Understood By Management
A new joint study between the Ponemon Institute and Tripwire suggests that risk-based security metrics may be too complicated for many senior members of the management team to understand. A survey of 1,321 security professionals from the UK and US discovered that 75% thought that metrics were important to a risk-based security program. Far more […]
Does Your Small Business Need Someone To Help When It Comes To Securing Your Computer System?
There have been so many advances that we have seen over the past few years when it comes to technology but there is nothing new in that – you will always hear about new technology. The newest technology is always the most popular and you can always see it on the TV and read about […]