Risk Management with Stuart King and Duncan Hart

April 2008

  • Traffic stats and the top 10 blogs

    Stuart King - Reed Elsevier 30 Apr 2008
  • This is the 300th published entry onto this blog. I thought it might be interesting to do a quick review of how many visitors it's getting, where you are all coming from and what the most popular ...

  • Portable Identity and the BBC

    Stuart King - Reed Elsevier 29 Apr 2008
  • We've spoken about OpenID before on this blog (see entries from 9 Feb 2008 and 7 Feb 2007) and I've been quite enthusiastic about the prospects for this "open, decentralized, free framework for ...

  • Petty local government bureaucracy alive and well!

    Stuart King - Reed Elsevier 28 Apr 2008
  • In September of this year my daughter will be moving schools. The local council need a copy of her birth certificate as confirmation of her identity. This is despite the fact that her birth ...

  • On trial - role of the CISO

    Stuart King - Reed Elsevier 28 Apr 2008
  • It was fun to be in the dock as one of the defendants in the mock trial of A N Corporate at Infosec last week. I acted the role of the hapless and rather impotent CISO working for an overbearing ...

  • Nigerian 419 scam on LinkedIn

    Stuart King - Reed Elsevier 24 Apr 2008
  • Researchers from BitDefender have detected that social networks are the newest medium for Nigerian "4-1-9" scams...In the most recent outbreak of the Nigerian scam -- an advance fee fraud that is ...

  • Reindeer meat and a new industry portal

    Stuart King - Reed Elsevier 22 Apr 2008
  • It was good to bump into many familiar faces around Infosec at Olympia today. In fact, it was a good day, period. I encountered one of the event team soon after arriving who was positively beaming ...

  • We are the weakest link

    Stuart King - Reed Elsevier 21 Apr 2008
  • Many things to do with security can be changed: you can change the firewall settings, you can change the locks, you can change process, you can change policy. What you cannot change is human ...

  • Clear communications

    Stuart King - Reed Elsevier 20 Apr 2008
  • For most people, discussions on information security are "filled with strange names and words that would be gibberish in any other context." In fact, I lifted that quote from todays Sunday Times ...

  • Infosec Europe

    Stuart King - Reed Elsevier 15 Apr 2008
  • Only a week to go until this years Infosec Europe at Olympia. The program this year looks, in my opinion, to be the best yet including input from some well known industry names such as Bruce ...

  • Positive Approach to Security Requests

    Stuart King - Reed Elsevier 14 Apr 2008
  • I'm glad to see that Gartner have taken my advice from last September and in a new research note entitled "Tutorial on How to Move Beyond Security Awareness to Create a Risk-Conscious Culture" ...

  • Too much thinking

    Stuart King - Reed Elsevier 14 Apr 2008
  • Some food for thought from this years RSA Conference is that "too much thinking can impair your judgement." That is the message of Malcolm Gladwell who says We expect those with expertise to give ...

  • End to end trust

    Stuart King - Reed Elsevier 09 Apr 2008
  • While the rest of the security industry is currently living it up at the RSA conference, I'm in Vienna, having completed another local security review, looking out of the window of the airport ...

  • Spam - still hard to stomach

    Stuart King - Reed Elsevier 07 Apr 2008
  • If you believe everything you read then the first mass electronic mailing was, according to this web site devoted to the history of Spam, sent in 1971. That's a full 37 years ago which is slightly ...

  • Flattery will get you nowhere

    Stuart King - Reed Elsevier 04 Apr 2008
  • What's in it for me? Now, if you ask me that's a perfectly reasonable response any time somebody asks you to give up your valuable time on a professional basis and participate in an event that is ...

  • Sexing up the logs

    Stuart King - Reed Elsevier 03 Apr 2008
  • The title of this blog is false - a pure marketing ploy. Quite simply there is nothing sexy about logs. Few of us take any enjoyment out of reviewing them but there are plenty of mandates around ...

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close