Recent Blog Posts
Data breach incident management and recovery
He would never enable Bluetooth on a mobile phone because of its inherent security problems. It is unclear how many of these have been fixed with the latest releases. But some are unlikely to be ...
When IT Meets Politics
Protecting Data or “Saving Lives; Saving Livelihoods”: Which comes first in a post Covid World?
Winsafe Ltd 17 May 2020Almost every nation except for those which already had them as a legacy of SARS (e.g. Singapore, South Korea and Taiwan) has had to move fast to produce computer systems that will help support a ...
Write side up - by Freeform Dynamics
Cybersecurity needs both psychologists and field marshals
Freeform Dynamics 19 Feb 2019Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations ...
Computer Weekly Editors Blog
Breach, rinse, repeat - when will companies get the IT security basics right?
Editor in chief 23 Sep 2016The news that Yahoo suffered a security breach affecting half a billion users has heads shaking and critics justifiably slamming corporate security practices once more. We seem to be stuck in a ...