Risk Management with Stuart King and Duncan Hart
December 2007
-
Securing home access to the network
- Reed Elsevier 31 Dec 2007 -
VoIP Security
- Reed Elsevier 27 Dec 2007 -
Millennials and Risk
- Reed Elsevier 26 Dec 2007
There is an ever increasing requirement to provide suitable facilities so that employees can work from home. Right now all we have available within my own organisation is an expensive and ...
Robert Moore is a convicted hacker, currently serving two years in prison for his role in stealing and reselling VoIP services. In an interview given to Information Week, Moore describes in detail ...
Interesting article here on Security Focus entitled "IT Risk and the Millennials" about the Generation Y workforce, their expectations, associated consumersation of IT and the risks that come along ...
-
Challenges ahead
- Reed Elsevier 20 Dec 2007 -
Microsoft Developers Highway Code
- Reed Elsevier 19 Dec 2007 -
L-Driver data breach: L-Government?
- Reed Elsevier 18 Dec 2007 -
Are we feeling a little vulnerable?
- Reed Elsevier 17 Dec 2007 -
Prediction for 2008 - more targeted attacks
- Reed Elsevier 16 Dec 2007 -
Dangerous developers
- Reed Elsevier 12 Dec 2007 -
Skype me!
- Reed Elsevier 11 Dec 2007
This is my last entry for a few days as I fully intend to make the most of the holidays. I wanted to take the opportunity to say thanks to those who regularly read and support this blog, and to ...
I'm not impressed by the new version of the Developer Highway Code from Microsoft. There's no denying the fact that it's all good, sound, common sense guidance but I'm wondering for who, and also ...
Another day, another data breach. Actually, another day, another blog about another data breach. Hey, at least it means I don't have to think too hard about what to write about! Flippant remarks ...
Quote of the week has got to be "Before, our systems were a little bit vulnerable, and now they are not" from Andrew Brenson, a spokesman for the charity Children In Need. Almost as good is the ...
If I have to make one prediction for 2008, it is that I think we will see an increase in reports of targeted attacks against organisations of all sizes and types. That such attacks are already ...
Developers often want to make use of shareware to obtain code they would otherwise need to be spending a lot of time developing. The IT Ethics handbook (by By Stephen Northcutt, ISBN 1931836221) ...
There are opposing forces in action - on the one hand a number of individuals who claim that they need Skype and consider life to be unfair unless they have it. On the other hand are those who ...
-
Physical Security Controls
- Reed Elsevier 10 Dec 2007 -
I admit it - I'm a geek at heart
- Reed Elsevier 09 Dec 2007 -
Start taking security seriously
- Reed Elsevier 08 Dec 2007 -
Where did all the data go?
- Reed Elsevier 05 Dec 2007 -
Computer Weekly Social Networking Survey
- Reed Elsevier 04 Dec 2007
Don't forget physical security. There are a number of aspects that you need to keep in mind including security of server rooms and data centers, access to office space, and verifying that security ...
I like to keep a close eye on the technical infrastructure. For instance, I've now got a Landesk client installed on my PC, which enables me to get the metrics I want on our infrastructure security ...
I admit that I've been guilty in the past of making flippant remarks such as "we're not a bank so don't need Fort Knox security" and other such excuses for not doing things as securely as I might ...
I've been trying to make the point that we can't protect data by following a checklist and filling in an audit sheet. These tools can assist us to identifying where we think the problems are but at ...
The results are in from the Computer Weekly survey on usage of Social Networking sites. The survey, based on 331 responses from a wide variety of organisations, provide an interesting insight into ...