Sergej Khackimullin - Fotolia

Risk Management with Stuart King and Duncan Hart

Dealing with the operational challenges of information security and risk management.

June 2008

  • Poynter Report

    Stuart King - Reed Elsevier 27 Jun 2008
  • The Poynter Report into the HMRC incident and subsequent investigation is an excellent insight and a great case-study in Information Security management. Surprisingly (at least to me) was the fact ...

  • Web based email and a prediction for the future

    Stuart King - Reed Elsevier 26 Jun 2008
  • I've been following an interesting Q&A thread on LinkedIn where the question is asked "Should business messages be allowed to flow through personal/webmail services?" What's interesting to note ...

  • Virgin Media Security Incident

    Stuart King - Reed Elsevier 25 Jun 2008
  • News that Virgin Media is conducting an internal inquiry into why 3,000 customers' bank details were burned to a CD which was then lost passed with little of the fuss usually associated with such ...

  • Social networking pros and cons

    Stuart King - Reed Elsevier 24 Jun 2008
  • The social networking security debate continues. Not just a debate, but a heated debate. I like those the best! Since I work for an organisation that is actively promoting the benefits of social ...

  • NHS Password Sharing and Business Requirements

    Stuart King - Reed Elsevier 24 Jun 2008
  • I was reading with interest Tony Collin's blog on password sharing in the NHS. In my view the problem is that the system being used was not designed to take into account the way that the customers ...

  • IT snooping - what is your team looking at?

    Stuart King - Reed Elsevier 23 Jun 2008
  • A recent survey from Cyber-Ark Software reveals the following information Whilst you sit there innocently working away, little do you realize that a third of your IT colleagues have been snooping ...

  • Internet coffee machine hacked

    Stuart King - Reed Elsevier 23 Jun 2008
  • Given all the world's problems: famine, disease, war and so on, thank goodness somebody has come up with the answer to it all. Yes, finally, a coffee machine that can be connected to the Internet. ...

  • AV industry sucks

    Stuart King - Reed Elsevier 22 Jun 2008
  • So says the CEO of Trend Micro, Eva Chen, in this new interview where she describes how a cloud-client architecture is the solution to stop malware. It's good to finally see one of the large ...

  • Broad principles and guaranteed security

    Stuart King - Reed Elsevier 20 Jun 2008
  • I've been looking at the security and risk associated with the development of a new web platform. On asking the lead developer to show me some basic documentation (an architecture diagram and ...

  • Security scare insight

    Stuart King - Reed Elsevier 19 Jun 2008
  • An excellent and insightful blog from one Peter Cochrane who describes what happened when he mislaid a couple of hard drives containing more than 100GB of information. Read it here: ...

  • Website Security, Application Firewalls, and Auditing at a Glance

    Stuart King - Reed Elsevier 18 Jun 2008
  • A good article here on "at a glance" website auditing. Take a look at any Website. Just by looking at the URL bar, I can glean several things right off the bat. If the site does a redirection to ...

  • Arrested for blogging

    Stuart King - Reed Elsevier 17 Jun 2008
  • 64 bloggers have been arrested in various parts of the world since 2003. A new report reveals that the majority of incidents took place in the Middle East and Asia with some in North America and ...

  • McKinnon: my two cents worth

    Stuart King - Reed Elsevier 17 Jun 2008
  • I can't make up my mind about Gary McKinnon. On the one hand he's portrayed by the US authorities as a serious threat to national security, on the other he sells himself as a curious but benign ...

  • Data Breach Investigations - Watch your partners

    Stuart King - Reed Elsevier 16 Jun 2008
  • At the start of this year I wrote a blog entitled "What CIOs should be doing about security in 2008" listing the top key security topics for CIOs to be thinking about this year. Number two on my ...

  • The role of HR in Information Security

    Stuart King - Reed Elsevier 14 Jun 2008
  • This turns out to be a more controversial subject than I had thought. My opinion is that the HR department is an essential ally for ensuring that information security policies are correctly ...