Risk Management with Stuart King and Duncan Hart
March 2008
-
10 things learnt in the last 12 months
- Reed Elsevier 31 Mar 2008 -
On the road again
- Reed Elsevier 25 Mar 2008 -
The First Rule of Programming: It's Always Your Fault
- Reed Elsevier 23 Mar 2008
I've been in my present role of Information Security Director for a year. It's a good time to reflect on some of the lessons learnt over the previous twelve months, and here are ten things that ...
This week I'm in Moscow. British Airways just about managed to get me here and maintain the 100% lateness record on flights I've taken in the last six months. Todays' escapades were either ...
I still dabble occassionally with programming in my spare time when I get the opportunity. I enjoy writing code but I don't profess to be particularly good at it - I could make things work but I ...
-
Network IPS Systems - still worth buying?
- Reed Elsevier 19 Mar 2008 -
Bad Phorm
- Reed Elsevier 18 Mar 2008 -
Malware in MP3 players
- Reed Elsevier 16 Mar 2008 -
Web Security - Scanners, Firewalls and the SDLC
- Reed Elsevier 15 Mar 2008 -
Malware still the biggest threat
- Reed Elsevier 14 Mar 2008 -
2008 Budget - On biometrics at Heathrow
- Reed Elsevier 12 Mar 2008 -
Consumer networks for business use
- Reed Elsevier 10 Mar 2008
I was involved in an interesting debate a couple of nights ago about the relative merits or otherwise of IPS. It's a subject I've talked about a couple of times before on this blog ( for instance ...
The prospect of behavorial-based advertising is something we should all be concerned about and something we should all be strongly voicing an objection to. Phorm, the company offering such a ...
Following on from the story about dodgy Cisco hardware, it seems that some of our popular consumer electronic gadgets such as MP3 players and digital picture frames are infected with malware before ...
There is no magic bullet for website security. If you've got a strategically important web product then you have to take a strategic approach to it's security. You'll find a lot of online resources ...
It's reckoned that two million new strains of malware, or five every two minutes, will emerge onto the Internet this year. That doesn't include the 15 to 20 new Trojans released every hour. These ...
From today's budget speech: Today I can announce new measures at Heathrow and other airports to ensure that a greater use of biometric technology speeds up the time it takes passengers to get ...
If all the hype is to be believed then IT execs who ignore Web 2.0 collaboration technologies could be hurting their company's bottom line. That, apparently, is the message from IT leaders and ...
-
Tall stories from Chinese hackers
- Reed Elsevier 08 Mar 2008 -
Biometrics would not have prevented SocGen incident
- Reed Elsevier 07 Mar 2008 -
Counterfeit Cisco gear threatens more than the network
- Reed Elsevier 04 Mar 2008 -
Security BPM
- Reed Elsevier 04 Mar 2008
There's an interesting interview with the leader of a Chinese hacker group on CNN. Xiao Chen makes a number of claims: that his group is paid by the Chinese government, that they have successfully ...
An early contender for the biggest load of security tosh of the year comes within the report produced by Société Générale in response to the recent trading fraud scandal. The report identifies a ...
The story on ComputerWeekly.com about fake Cisco hardware should send a shiver down the spine of everyone managing a security infrastructure. It's not just the issue of dodgy gear that's likely to ...
Some excellent words of wisdom from Mark Curpheyif you understand and document your process, your metrics and objectives, model and automate your process, understand and implement your process and ...