Risk Management with Stuart King and Duncan Hart
January 2008
-
Can Agile development be secure? Yes it can!
- Reed Elsevier 30 Jan 2008 -
Janet & John Security
- Reed Elsevier 26 Jan 2008 -
Security Metrics - Are we secure?
- Reed Elsevier 24 Jan 2008
Give me a pound for every development team I've heard saying that they use an "Agile" methodology and I'll be able to fulfil my planned dream of retiring to a small Greek Island where I'll spend my ...
Two stories in the press demonstrate that the disgruntled or motivated employee remains a threat to be reckoned with. The first, of course, relates to the SocGen rogue trader. The second, on a ...
It's crunch time and some facts and figures are needed to demonstrate security status to senior management. How are you going to do that? I've been working for a while on making sure that I have ...
-
Government Data Loss
- Reed Elsevier 22 Jan 2008 -
The Dark Visitor
- Reed Elsevier 21 Jan 2008 -
Going round in circles
- Reed Elsevier 20 Jan 2008 -
Online security - a new approach needed
- Reed Elsevier 20 Jan 2008 -
Egg on my face?
- Reed Elsevier 18 Jan 2008 -
ICO plea to business
- Reed Elsevier 17 Jan 2008 -
What CIOs should be doing about security in 2008
- Reed Elsevier 14 Jan 2008
The continuing instances of private data loss and compromises from government and military departments are indicative of organisations that treat security as an expense to be avoided rather than as ...
I've been reading an interesting blog that focuses on the subject of Chinese hackers and a PRC government run organization of eight Chinese hacker groups dedicated to cyber espionage. This is a ...
The following quote is taken from an article entitled Computer Security: A Current Assessment, published in the very first edition of Computers & Security Journal back in January 1982.We have ...
A few days ago, an acquaintance of mine revealed that a web site his organisation owns was defaced. In fact, this was not for the first time as the same site was defaced a couple of years ago and ...
An interesting comment has been posted to a blog I wrote last September relating to Salesforce.com and how my opinions at the time leave me supposedly with "egg on face" following the recent ...
Careless, inexcusable and horrifying are the three adjectives used by Richard Thomas, the UK information commissioner, to describe the recent proliferation of security breaches. Mr Thomas added: ...
information security is fundamentally about three things: protecting confidentiality, maintaining integrity, and ensuring the availability of data. Also, now more than ever it's about protecting ...
-
Chinese Hackers - are we under attack?
- Reed Elsevier 13 Jan 2008 -
Hacker safe? No it isn't.
- Reed Elsevier 10 Jan 2008 -
Snack attack
- Reed Elsevier 09 Jan 2008 -
Use this blog with caution
- Reed Elsevier 09 Jan 2008 -
Infosec Podcasts - please listen
- Reed Elsevier 08 Jan 2008
Each of the following quotes is from a news report within the past few days. See if you can spot the common theme.. South Korea's military is warning of cyberattacks against its personnel using ...
There are a number of reasons why I have never recommended making use of services such as ScanAlert for certifying any of my own organisations hundreds of websites, but they all really boil down to ...
I have committed a careless act and put lives at risk. Yes, apparently it's true. The voice on the telephone that broke the news to me couldn't have been more serious. It may only have been an ...
Do you find this blog to be "seductively immediate, vividly worded and apparently candid"? If so, then according to Gartner, you should exercise "care and caution" before using it as a reference. ...
Do you mind if I shamelessly promote my own organisation's products? Of course not, I hear you say. Good. In that case, if you haven't already been there, please browse across to www.infosec.co.uk, ...