Risk Management with Stuart King and Duncan Hart

Recent Posts

  • Government Data Loss

    Stuart King - Reed Elsevier 22 Jan 2008
  • The continuing instances of private data loss and compromises from government and military departments are indicative of organisations that treat security as an expense to be avoided rather than as ...

  • The Dark Visitor

    Stuart King - Reed Elsevier 21 Jan 2008
  • I've been reading an interesting blog that focuses on the subject of Chinese hackers and a PRC government run organization of eight Chinese hacker groups dedicated to cyber espionage. This is a ...

  • Going round in circles

    Stuart King - Reed Elsevier 20 Jan 2008
  • The following quote is taken from an article entitled Computer Security: A Current Assessment, published in the very first edition of Computers & Security Journal back in January 1982.We have ...

  • Online security - a new approach needed

    Stuart King - Reed Elsevier 20 Jan 2008
  • A few days ago, an acquaintance of mine revealed that a web site his organisation owns was defaced. In fact, this was not for the first time as the same site was defaced a couple of years ago and ...

  • Egg on my face?

    Stuart King - Reed Elsevier 18 Jan 2008
  • An interesting comment has been posted to a blog I wrote last September relating to Salesforce.com and how my opinions at the time leave me supposedly with "egg on face" following the recent ...

  • ICO plea to business

    Stuart King - Reed Elsevier 17 Jan 2008
  • Careless, inexcusable and horrifying are the three adjectives used by Richard Thomas, the UK information commissioner, to describe the recent proliferation of security breaches. Mr Thomas added: ...

  • What CIOs should be doing about security in 2008

    Stuart King - Reed Elsevier 14 Jan 2008
  • information security is fundamentally about three things: protecting confidentiality, maintaining integrity, and ensuring the availability of data. Also, now more than ever it's about protecting ...

  • Chinese Hackers - are we under attack?

    Stuart King - Reed Elsevier 13 Jan 2008
  • Each of the following quotes is from a news report within the past few days. See if you can spot the common theme.. South Korea's military is warning of cyberattacks against its personnel using ...

  • Hacker safe? No it isn't.

    Stuart King - Reed Elsevier 10 Jan 2008
  • There are a number of reasons why I have never recommended making use of services such as ScanAlert for certifying any of my own organisations hundreds of websites, but they all really boil down to ...

  • Snack attack

    Stuart King - Reed Elsevier 09 Jan 2008
  • I have committed a careless act and put lives at risk. Yes, apparently it's true. The voice on the telephone that broke the news to me couldn't have been more serious. It may only have been an ...

  • Use this blog with caution

    Stuart King - Reed Elsevier 09 Jan 2008
  • Do you find this blog to be "seductively immediate, vividly worded and apparently candid"? If so, then according to Gartner, you should exercise "care and caution" before using it as a reference. ...

  • Infosec Podcasts - please listen

    Stuart King - Reed Elsevier 08 Jan 2008
  • Do you mind if I shamelessly promote my own organisation's products? Of course not, I hear you say. Good. In that case, if you haven't already been there, please browse across to www.infosec.co.uk, ...

  • Hard sales

    Stuart King - Reed Elsevier 08 Jan 2008
  • Two experiences with vendors today: first one gave a credible presentation and quoted some good prices before departing with a promise to put the quote in writing later in the day. Lo and behold ...

  • Managing data - getting the definitions right

    Stuart King - Reed Elsevier 07 Jan 2008
  • One particular challenge I keep coming back to is defining what "confidential" means with reference to data. What is the difference between "confidential" and "restricted" and "private" ? I also ...

  • RFID Passports

    Stuart King - Reed Elsevier 06 Jan 2008
  • Last week, the US "State Department approved technology that will allow passport cards, which can be used by U.S. citizens instead of a passport when traveling to other countries in the western ...

SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close