New consent rules for data processing
The proposed Data Protection Regulation contains a new regime for consent-based data processing. It places high compliance obstacles in the path of data controllers, which, if implemented, will...
View ArticleOur only hope lies with Academia
Lately I've been spending more time lecturing to universities (Oxford and Surrey this week, Portsmouth the week after next). At each session I set out to present what's wrong with Information Security...
View Articlewhat is hiding in your email ?
It used to be that all we had to fear in the corporate world email leak wise, was that company email would be read back to an executive in a court of law by an opposing lawyer. This would occur after...
View ArticleWhich is the most risky social network?
Just before Christmas I was participating in a Secure Computingwebcast on the subject of social networking and the question came up, “which was the most dangerous social network from a corporate point...
View ArticleImpact of the new EU privacy regime
I’m popping over this morning to a meeting of the Information Security Forum, at GSK’s offices in Brentford (an awkward commute for me, but that’s another point), to give a talk on the “impact of the...
View ArticleTrust and Society
I used to think that Bruce Schneier was out of touch with industry CISOs, but now I think that they are out of touch with him. He's come on tremendously in recent years. I saw him present to the...
View ArticleLets Go Phishing
It can seem at times that the only people who like change are Internet attackers. And they don’t just like it—they need it. Technology’s rapid changes give cybercriminals new attack vectors to exploit,...
View ArticleBreach disclosure – the law of unintended consequences
We seem to have been talking about breach disclosure laws for ages. Well, it has been ages, nearly a decade – 2003 was the landmark, when California introduced the first true security breach disclosure...
View ArticleWho influences security?
I was contacted last week by a company that specialises in harnessing influence. They claimed to be working for a top IT security solutions vendor and had identified me as a key "influencer" in the UK....
View ArticleIs cheating a game a criminal offence ?
When does cheating in a video game become a criminal matter ? I recently came across this story where by 2 men was accused of “cheating” video poker machines in Las Vegas.In essence they are alledged...
View ArticleFishing for Phishers
We seem to take phishing attacks for granted these days, in much the same way that we’ve accepted spam as a natural, and inevitable, by-product of email. Some experts believe that one of the best...
View ArticleSecurite Informatique et politique ?
« Tout n'est pas politique, mais la politique s'intéresse à tout » (Nicolas Machiavel). A quelques semaines du premier tour des élections présidentielles, la politique s’intéresse notamment à la...
View ArticleMeeting the demands of the contemporary security market
It's been a long time since I last blogged. It's been due to excessive commitments. Freelance work has been thick and fast since the beginning of the year, reflecting an increasingly a robust market...
View ArticleDesire Paths and what they tell us about security
I heard an interesting term the other day “desire path” it is a term used to describe the side paths that often pop up in parks away from the main path that people use as a short cut between the main...
View ArticleWhat's the point of a management system?
My blog posting on OODA loops prompted a response from Andrew Yeomans, pointing out that Deming loops and Boyd loops are not mutually exclusive, i.e. you can have a slow moving management system...
View ArticleThe Evil Shredder
Shredders, the object of last resort for handling confidential information. Most education and awareness programs tell their users to always use a shredder to dispose of documents so office users ( and...
View ArticleDPA Fines – Why ICO Got it Right
I’ve heard two arguments that are critical of the ICO fines. They go something like this: (1) the fines were too low and (2) it’s wrong of ICO to fine a Local Authority when it didn’t fine Google. Let...
View ArticleSecuring your Cloud Experience
By Ian Moyse, Sales Director www.workbooks.com , Eurocloud UK Board Member & Cloud Industry Forum Governance Board MemberSecurity is one of the most important factors for companies who want to...
View ArticleTHE CRM Lottery ‘Will you get the outcome you expect or will you be one of...
Let’s discuss a couple of the heavyweight C words in the IT Sector, Cloud and CRM.What do they have in common? Well they have both certainly provoked a lot of press coverage and airtime, both have...
View ArticleTop trends in cloud computing for SMEs
Ian Moyse, Workbooks.com Sales Director, Eurocloud UK Board Member&Cloud Industry Forum Governance Board Member.Following Gartner’s recent report on what it sees as the 5 key trends that will shape...
View Article