Sergej Khackimullin - Fotolia

Risk Management with Stuart King and Duncan Hart

Dealing with the operational challenges of information security and risk management.

March 2008

  • 10 things learnt in the last 12 months

    Stuart King - Reed Elsevier 31 Mar 2008
  • I've been in my present role of Information Security Director for a year. It's a good time to reflect on some of the lessons learnt over the previous twelve months, and here are ten things that ...

  • On the road again

    Stuart King - Reed Elsevier 25 Mar 2008
  • This week I'm in Moscow. British Airways just about managed to get me here and maintain the 100% lateness record on flights I've taken in the last six months. Todays' escapades were either ...

  • The First Rule of Programming: It's Always Your Fault

    Stuart King - Reed Elsevier 23 Mar 2008
  • I still dabble occassionally with programming in my spare time when I get the opportunity. I enjoy writing code but I don't profess to be particularly good at it - I could make things work but I ...

  • Network IPS Systems - still worth buying?

    Stuart King - Reed Elsevier 19 Mar 2008
  • I was involved in an interesting debate a couple of nights ago about the relative merits or otherwise of IPS. It's a subject I've talked about a couple of times before on this blog ( for instance ...

  • Bad Phorm

    Stuart King - Reed Elsevier 18 Mar 2008
  • The prospect of behavorial-based advertising is something we should all be concerned about and something we should all be strongly voicing an objection to. Phorm, the company offering such a ...

  • Malware in MP3 players

    Stuart King - Reed Elsevier 16 Mar 2008
  • Following on from the story about dodgy Cisco hardware, it seems that some of our popular consumer electronic gadgets such as MP3 players and digital picture frames are infected with malware before ...

  • Web Security - Scanners, Firewalls and the SDLC

    Stuart King - Reed Elsevier 15 Mar 2008
  • There is no magic bullet for website security. If you've got a strategically important web product then you have to take a strategic approach to it's security. You'll find a lot of online resources ...

  • Malware still the biggest threat

    Stuart King - Reed Elsevier 14 Mar 2008
  • It's reckoned that two million new strains of malware, or five every two minutes, will emerge onto the Internet this year. That doesn't include the 15 to 20 new Trojans released every hour. These ...

  • 2008 Budget - On biometrics at Heathrow

    Stuart King - Reed Elsevier 12 Mar 2008
  • From today's budget speech: Today I can announce new measures at Heathrow and other airports to ensure that a greater use of biometric technology speeds up the time it takes passengers to get ...

  • Consumer networks for business use

    Stuart King - Reed Elsevier 10 Mar 2008
  • If all the hype is to be believed then IT execs who ignore Web 2.0 collaboration technologies could be hurting their company's bottom line. That, apparently, is the message from IT leaders and ...

  • Tall stories from Chinese hackers

    Stuart King - Reed Elsevier 08 Mar 2008
  • There's an interesting interview with the leader of a Chinese hacker group on CNN. Xiao Chen makes a number of claims: that his group is paid by the Chinese government, that they have successfully ...

  • Biometrics would not have prevented SocGen incident

    Stuart King - Reed Elsevier 07 Mar 2008
  • An early contender for the biggest load of security tosh of the year comes within the report produced by Société Générale in response to the recent trading fraud scandal. The report identifies a ...

  • Counterfeit Cisco gear threatens more than the network

    Stuart King - Reed Elsevier 04 Mar 2008
  • The story on about fake Cisco hardware should send a shiver down the spine of everyone managing a security infrastructure. It's not just the issue of dodgy gear that's likely to ...

  • Security BPM

    Stuart King - Reed Elsevier 04 Mar 2008
  • Some excellent words of wisdom from Mark Curpheyif you understand and document your process, your metrics and objectives, model and automate your process, understand and implement your process and ...