Hackers @ Microsoft

“Welcome to a new blog from Microsoft.” is the first sentence in a new Blog launched by Microsoft called “Hackers @ Microsoft”.  This interesting new Blog is aimed at “white hat” hackers and promises to provide posts from the various hackers and security researchers employed by Microsoft.  It will be interesting to see how active this new […]

Global Security Week Seminar to be Held In Dublin

Global Security Week, in conjunction with VigiTrust and BH Consulting, is pleased to announce a seminar on the theme of “Privacy in the 21st Century” to be held on 5th September 2007. The theme this year is intended to highlight how businesses and individuals can better protect personal information however it might be stored (paper […]

Skype outage – Who is to Blame?

Skype users recently suffered three days of service disruption with many users being effectively off air for that period. The problem appears to have started on August the 16th when users could no longer log into the service and make calls. Skype have denied the outage was due to any Denial of Service attacks or […]

Information Security – Overhyped?

A discussion with an old friend recently strayed into the area of information security and the hype that she currently sees surrounding products that will make us more compliant, secure and hacker proof.  She works as an IT manager is a relatively large company and confessed to feeling confused by the various products, their claims and indeed the hype […]

Why use ISO 27001?

Over the past few months more clients are asking me what is ISO 27001 and what are the benfits of implementing an Information Security Management System based on the standard? ISO 27001 is a vendor and technology neutral internationally recognised standard which provides companies with a risk based approach to securing their information.  It provides organisations with independent […]

July Edition of Security Watch Newsletter Now Available

The July 2007 edition of our sister publication, the Security Watch Newsletter, is now available online.  For those of you who do not subscribe to our newsletter, you may find it a useful read as we highlight issues and stories that may not be applicable to our Blog.

Final Version of "Cyber-Security Check List" by the US CCU is now available.

The U.S. Cyber Consequences Unit, an independent research group that supplies the U.S. Department of Homeland Security with information on the consequences of cyber-attacks and evaluates the cost-effectiveness of countermeasures in place to prevent such attacks, has released the final version of its “Cyber-Security Check List”. This list is a comprehensive guide to help those […]

ISO 27001 As a Tool for Compliance

Knowlege Ireland recently published an article I wrote discussing how the ISO 27001 standard can be used as a foundation to help companies ensure they meet their compliance requirements, be that SOX, Basel II, PCI or the Data Protection Act.  The premise that I put forward is that having a certified Information Security Management System […]

Privacy in the 21st Century – Global Security Week '07

The 3rd annual Global Security Week will run from September 3rd to 9th 2007 with this year’s theme being “Privacy in the 21st Century”.  The theme this year is intended to highlight how individuals and companies can better protect personal information that is not only stored online and on various different computer systems, such as […]

List of Security Certifications

In a previous post I talked about the value of certifications in the information security industry.  As a result of that post a number of people asked me what certifications are available?  Luckily I previously compiled a list of certifications for a study group run by ENISA (the European Network and Information Security Agency).  So […]