Risk Management with Stuart King and Duncan Hart

Recent Posts

  • Open University course on forensics

    Stuart King - Reed Elsevier 09 Oct 2008
  • Only a couple of weeks to go until I commence a new course through the Open University entitled Computer Forensics and Investigations. You can read more about what this course offers online here ...

  • Strategy and the business

    Stuart King - Reed Elsevier 07 Oct 2008
  • Today it's time for my annual information security strategy review. Some of the activities discussed the last time around are now considered to be business as usual - that's a big tick in the right ...

  • Incident response - practice makes ready

    Stuart King - Reed Elsevier 06 Oct 2008
  • It might surprise you to learn that I had no interest in security, computers or IT until I was well into my twenties. In fact I wanted to be a pilot in the RAF but failed the application process ...

  • Virgin Media data breach highlights the powers of the ICO

    Stuart King - Reed Elsevier 03 Oct 2008
  • The news that Virgin Media have experienced a data breach is not so interesting as the consequences (see full story here).On reporting the loss of a CD containing 3000 unencrypted customer records, ...

  • Is IT Security dead?

    Stuart King - Reed Elsevier 01 Oct 2008
  • If the Gartner IT Security Summit is the best the industry has to offer, then IT Security is dead. I've come away from it not merely disappointed, but frustrated. Frustrated that I've been sitting ...

  • Chips and custard

    Stuart King - Reed Elsevier 29 Sep 2008
  • Two things that definately do not go together are chips and custard. Unless you're pregnant. Or from Belgium where I suppose it's not too far removed from smothering your frites with mayo. An old ...

  • Breaking websites without touching the application

    Stuart King - Reed Elsevier 26 Sep 2008
  • Just as there is more than one way to skin a cat, there are many ways to break a web application. When I speak to developers and ask them if they are producing a secure system, the answer I'll get ...

  • Value of CISSP status

    Stuart King - Reed Elsevier 25 Sep 2008
  • It's been a while since I updated my CISSP certification with CPE credits. In fact, I've not even thought of it even though I've got plenty accumulated and was wondering why I continue to pay the ...

  • BBC Mailing List Compromised

    Stuart King - Reed Elsevier 24 Sep 2008
  • A point I frequently make is that it's not just the regulated and sensitive data sets that have value and require good control. Simple lists of email addresses and names also have value. No better ...

  • Unauthorised software on the network

    Stuart King - Reed Elsevier 24 Sep 2008
  • I spent a good part of a recent day discussing the reasons why I had instructed the removal of certain unauthorised software from a number of PCs on the company network. The arguments that came my ...

  • There's a hole in your network and you're not the first to know...

    Stuart King - Reed Elsevier 22 Sep 2008
  • In the words of the great poet, David Brent (from The Office), "If you can keep your head when all around you have lost theirs, then you probably haven't understood the seriousness of the ...

  • Hypothetical situation: security incident or not?

    Stuart King - Reed Elsevier 19 Sep 2008
  • A friend and I were imagining the following hypothetical situation: somebody performs a change to a network service which subsequently (let's presume it's business critical) is out of action for an ...

  • Information security is not recession proof

    Stuart King - Reed Elsevier 18 Sep 2008
  • I keep getting told how lucky I am to be doing a job perceived to be "recession proof." Personally I don't think this is the case. If the company were to go down then I doubt there would be much ...

  • Communication and the first law of security

    Stuart King - Reed Elsevier 16 Sep 2008
  • Security makes for a great scapegoat. "We can't get access to the website" then blame security. "My computer is running too slow", blame all the security tools on it. "I can't get access to the ...

  • Cern Website Hacked

    Stuart King - Reed Elsevier 15 Sep 2008
  • A website associated with the Large Hadron Collider (LHC) atom-smashing experiment at Cern has been hacked.A group of hackers called the GST, or Greek Security Team, has claimed responsibility for ...

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close