Risk Management with Stuart King and Duncan Hart

March 2007

  • Risk assessment - how many locks?

    Stuart King - Reed Elsevier 12 Mar 2007
  • Anyone who has had the pleasure of participating in one of my presentations on information security over the past few years will know I have a favorite picture I like to show. It's of a padlocked ...

  • OWASP - Secure Development Projects

    Stuart King - Reed Elsevier 09 Mar 2007
  • OWASP announced in their latest newsletter the completion of a number of projects designed to assist developers write more secure code. For more information go to ...

  • OneCare - correction to earlier blog

    Stuart King - Reed Elsevier 08 Mar 2007
  • I need to correct an error I made in my blog entry earlier this week where with regards to a test performed by AV-Comparitives on MS OneCare I stated "There is no detail as to what configurations ...

  • Identity Management Survey

    Stuart King - Reed Elsevier 08 Mar 2007
  • I was reading the Ponemon Institute Survey on Identity Compliance. You can download it here. The report focuses on identity management (IdM) across different sized organisations (i.e. enterprise ...

  • Microsoft OneCare - do we care?

    Stuart King - Reed Elsevier 06 Mar 2007
  • A few short days ago I asked the question "Do the anti-malware controls built into Windows Vista mean that we can begin to think about reducing the amount we spend on third party desktop AV ...

  • A new secure software special interest group

    Stuart King - Reed Elsevier 05 Mar 2007
  • David Lacey draws attention to the Cyber Security KTN Secure Software Special Interest Group on his blog. I'm totally behind any initiative that sets out to improve software security and I hope ...

  • Building an information security strategy

    Stuart King - Reed Elsevier 05 Mar 2007
  • While I've spent a lot of time describing certain aspects of my work within information security, something I've not really touched upon is how the program originated, and the question of where and ...

  • Thoughts on UTM

    Stuart King - Reed Elsevier 01 Mar 2007
  • We've been having some discussions here about UTM (Unified Threat Management) devices. For those of you who don't know, UTM applicances are products that unify and integrate multiple security ...

SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close