Risk Management with Stuart King and Duncan Hart
Recent Posts
-
BNP Data Breach
- Reed Elsevier 19 Nov 2008 -
Malware hits London hospitals
- Reed Elsevier 18 Nov 2008 -
Do you know what you don't know?
- Reed Elsevier 18 Nov 2008
The data breach suffered by the British National Party is a low-tech incident against which there is little defence. See http://news.bbc.co.uk/1/hi/uk/7736794.stm.I have no personal sympathy for ...
It's interesting to speculate how three seperate hospital computer systems have managed to simultaneously fall victim to malware. See http://news.bbc.co.uk/1/hi/england/london/7735502.stm. Given ...
I've learnt the hard way that however much time gets assigned to a business unit security review, that you invariably step off the plane on arriving home and suddenly think of three more questions ...
-
The first rule of Information Security
- Reed Elsevier 17 Nov 2008 -
Rambling on about risk assessment
- Reed Elsevier 14 Nov 2008 -
A question of origin
- Reed Elsevier 13 Nov 2008 -
Security awareness from the moon
- Reed Elsevier 12 Nov 2008 -
What the CIO should know about security in the cloud
- Reed Elsevier 10 Nov 2008 -
Dreaming of PaaS
- Reed Elsevier 06 Nov 2008 -
Soundbites and catfood
- Reed Elsevier 04 Nov 2008
My first rule of Information Security has today been demonstrated to good effect to still hold true. The rule being: "If you don't check then it hasn't been done."The somewhat related second rule ...
I was reading with interest a two-part blog posting from Chris Hayes on his Risktical Ramblings site. It's a detailed and thorough run through of a risk assessment process. I actually think it's ...
My daughter's school (which she has attended for the past two years) has sent a questionnaire for me to complete for their records. They apparently need details of her ethnic origin and first ...
A few days ago, I was privy to the first quarterly Security Awareness Newsletter distributed by a large corporate organisation for the digestion of a globally dispersed workforce. By all accounts ...
Recent history shows us that the world doesn't end when we introduce change. The people who should feel threatened by the introduction of cloud-based services are those who refuse to adapt and ...
Dreamforce is the snazzy name for Saleforce.com's annual show-and-tell extravaganza. It's a pretty stylish event too: rock bands, parties, and big theatrical presentations. I didn't go but if ...
According to John Pescatore of Gartner "The best security program is at the business with the happiest customers." Surely, that puts Whiskers Supermeat at the top with their claim that 8 out of 10 ...
-
Gordon Bennett
- Reed Elsevier 03 Nov 2008 -
Fighting Death by PowerPoint
- Reed Elsevier 31 Oct 2008 -
Security policies are unrealistic
- Reed Elsevier 30 Oct 2008 -
BBC Article - Bosses 'ignore toxic data risk'
- Reed Elsevier 29 Oct 2008 -
Social networking - Current trends report
- Reed Elsevier 28 Oct 2008
The statement from Gordon Brown that "We can't promise that every single item of information will always be safe because mistakes are made by human beings" beggers belief (see article here). It's a ...
I like the irony of a 61 slide PowerPoint presentation about how to avoid Death by PowerPoint. Linked here from Colin Beveridge's excellent IT blog at www.colin-beveridge.comDeath by PowerPointView ...
"Employees' disregard of corporate IT policies will increase as long as the policy is too rigid or impractical to allow them to get their jobs done." Full article online here.In my opinion, this is ...
Bosses must stop leaving data security to the "IT boys" and other staff and take responsibility themselves, the UK's information watchdog has ...
A new survey from FaceTime Communications describes the apparent risks from the increasing use of consumer social networking sites from within the corporate network. You can download it here. ...