Risk Management with Stuart King and Duncan Hart
June 2008
-
Poynter Report
- Reed Elsevier 27 Jun 2008 -
Web based email and a prediction for the future
- Reed Elsevier 26 Jun 2008 -
Virgin Media Security Incident
- Reed Elsevier 25 Jun 2008
The Poynter Report into the HMRC incident and subsequent investigation is an excellent insight and a great case-study in Information Security management. Surprisingly (at least to me) was the fact ...
I've been following an interesting Q&A thread on LinkedIn where the question is asked "Should business messages be allowed to flow through personal/webmail services?" What's interesting to note ...
News that Virgin Media is conducting an internal inquiry into why 3,000 customers' bank details were burned to a CD which was then lost passed with little of the fuss usually associated with such ...
-
Social networking pros and cons
- Reed Elsevier 24 Jun 2008 -
NHS Password Sharing and Business Requirements
- Reed Elsevier 24 Jun 2008 -
IT snooping - what is your team looking at?
- Reed Elsevier 23 Jun 2008 -
Internet coffee machine hacked
- Reed Elsevier 23 Jun 2008 -
AV industry sucks
- Reed Elsevier 22 Jun 2008 -
Broad principles and guaranteed security
- Reed Elsevier 20 Jun 2008 -
Security scare insight
- Reed Elsevier 19 Jun 2008
The social networking security debate continues. Not just a debate, but a heated debate. I like those the best! Since I work for an organisation that is actively promoting the benefits of social ...
I was reading with interest Tony Collin's blog on password sharing in the NHS. In my view the problem is that the system being used was not designed to take into account the way that the customers ...
A recent survey from Cyber-Ark Software reveals the following information Whilst you sit there innocently working away, little do you realize that a third of your IT colleagues have been snooping ...
Given all the world's problems: famine, disease, war and so on, thank goodness somebody has come up with the answer to it all. Yes, finally, a coffee machine that can be connected to the Internet. ...
So says the CEO of Trend Micro, Eva Chen, in this new interview where she describes how a cloud-client architecture is the solution to stop malware. It's good to finally see one of the large ...
I've been looking at the security and risk associated with the development of a new web platform. On asking the lead developer to show me some basic documentation (an architecture diagram and ...
An excellent and insightful blog from one Peter Cochrane who describes what happened when he mislaid a couple of hard drives containing more than 100GB of information. Read it here: ..security ...
-
Website Security, Application Firewalls, and Auditing at a Glance
- Reed Elsevier 18 Jun 2008 -
Arrested for blogging
- Reed Elsevier 17 Jun 2008 -
McKinnon: my two cents worth
- Reed Elsevier 17 Jun 2008 -
Data Breach Investigations - Watch your partners
- Reed Elsevier 16 Jun 2008 -
The role of HR in Information Security
- Reed Elsevier 14 Jun 2008
A good article here on "at a glance" website auditing. Take a look at any Website. Just by looking at the URL bar, I can glean several things right off the bat. If the site does a redirection to ...
64 bloggers have been arrested in various parts of the world since 2003. A new report reveals that the majority of incidents took place in the Middle East and Asia with some in North America and ...
I can't make up my mind about Gary McKinnon. On the one hand he's portrayed by the US authorities as a serious threat to national security, on the other he sells himself as a curious but benign ...
At the start of this year I wrote a blog entitled "What CIOs should be doing about security in 2008" listing the top key security topics for CIOs to be thinking about this year. Number two on my ...
This turns out to be a more controversial subject than I had thought. My opinion is that the HR department is an essential ally for ensuring that information security policies are correctly ...