Risk Management with Stuart King and Duncan Hart
March 2009
-
Ranums's Rant - Risk Takers and Security Disasters
- Reed Elsevier 30 Mar 2009 -
GhostNet
30 Mar 2009 -
Far from smart phones
24 Mar 2009
An interesting rant on Information Security from Marcus Ranum online here. I picked up on the following quote:The security team explained why it was a bad idea; in fact they wrote a brilliantly ...
Loads of coverage of the GhostNet story at the weekend. The FT, NY Times, Sydney Morning Herald and BBC all highlight the Munk Centre for International Studies report on the cyber 'spying' network ...
Does anyone know of a smart phone or mobile device that enforces account and privilege separation? It's been a long held good practice to run user accounts with least level of system privilege and ...
-
Security, scale and functionality - Part 3: Functionality
23 Mar 2009 -
Top 5 information security annoyances - #2
- Reed Elsevier 21 Mar 2009 -
Laptop with personal data stolen
- Reed Elsevier 20 Mar 2009 -
BBC, BotNets and legal hacking
- Reed Elsevier 17 Mar 2009 -
Top 5 Information Security Annoyances
- Reed Elsevier 17 Mar 2009 -
BBC violate Computer Misuse Act
- Reed Elsevier 16 Mar 2009 -
Security, scale and functionality - Part 2: Scale
16 Mar 2009
I love system functionality, it's a great thing. It brings a rich and dynamic user experience or empowerment through seamless processes to get things done. Whether it be business functionality or ...
Few of my blogs have generated so much venom to be thrown in my direction than this one from last week. One blogger from America has gone so far as to write two very lengthy pieces in response ...
Another third party vendor failing to implement decent security around sensitive data. http://news.bbc.co.uk/1/hi/england/suffolk/7954393.stmYou've got to check out your vendors! The vendor might ...
On Monday I remarked on the BBC Click botnet investigation. I slightly regret my post because, in fact, I think they did a great job in bringing to life the potency of botnets. Legalities aside, ...
I'm generally a tolerant and easy going sort of person. There's a fairly short list of things that get my goat. For instance, our local doctors surgery has a call queuing system with 6 different ...
Software used to control thousands of home computers has been acquired online by the BBC as part of an investigation into global cyber crime. The technology programme Click has demonstrated just ...
Scale, whether it is physical or logical, brings some interesting security challenges. The fundamental issues are oversight, assurance and misplaced trust. Extended enterprises and supply chains ...
-
Council staff face Facebook ban
- Reed Elsevier 11 Mar 2009 -
Google Docs accidentally shared
- Reed Elsevier 10 Mar 2009 -
Google latitude - power to the people
- Reed Elsevier 09 Mar 2009 -
NYPD Data Center Theft
- Reed Elsevier 09 Mar 2009 -
Security, scale and functionality trade-offs
09 Mar 2009
Hampshire County Council is threatening to block staff from using the social networking site Facebook. Bosses said they noticed an increase in use and during monitoring 46 employees were found to ...
From SC MagazineUsers of the Google Docs application have had their information inadvertently shared. A flaw has been identified in the system, which meant that some documents were marked down as ...
In a country boasting the highest number of CCTV cameras in the world in proportion to the population; where local council workers can work as undercover spys to root out everything from putting ...
An interesting event reported in America where a civilian employee allegedly stole personal information on 80000 serving and former NYPD police officers. It's being called a "massive data breach" ...
If decisions about design and modes of operation all involve trade-offs then security, scale and rich functionality have got to be at the top of the feature trade-off list.I've believed for a long ...