Quantcast
Channel: Net Focus
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

New consent rules for data processing

The proposed Data Protection Regulation contains a new regime for consent-based data processing. It places high compliance obstacles in the path of data controllers, which, if implemented, will...

View Article



Image may be NSFW.
Clik here to view.

Our only hope lies with Academia

Lately I've been spending more time lecturing to universities (Oxford and Surrey this week, Portsmouth the week after next). At each session I set out to present what's wrong with Information Security...

View Article

Image may be NSFW.
Clik here to view.

what is hiding in your email ?

It used to be that all we had to fear in the corporate world email leak wise, was that company email would be read back to an executive in a court of law by an opposing lawyer. This would occur after...

View Article

Image may be NSFW.
Clik here to view.

Which is the most risky social network?

Just before Christmas I was participating in a Secure Computingwebcast on the subject of social networking and the question came up, “which was the most dangerous social network from a corporate point...

View Article

Image may be NSFW.
Clik here to view.

Impact of the new EU privacy regime

I’m popping over this morning to a meeting of the Information Security Forum, at GSK’s offices in Brentford (an awkward commute for me, but that’s another point), to give a talk on the “impact of the...

View Article


Image may be NSFW.
Clik here to view.

Trust and Society

 I used to think that Bruce Schneier was out of touch with industry CISOs, but now I think that they are out of touch with him. He's come on tremendously in recent years. I saw him present to the...

View Article

Image may be NSFW.
Clik here to view.

Lets Go Phishing

It can seem at times that the only people who like change are Internet attackers. And they don’t just like it—they need it. Technology’s rapid changes give cybercriminals new attack vectors to exploit,...

View Article

Image may be NSFW.
Clik here to view.

Breach disclosure – the law of unintended consequences

We seem to have been talking about breach disclosure laws for ages. Well, it has been ages, nearly a decade – 2003 was the landmark, when California introduced the first true security breach disclosure...

View Article


Image may be NSFW.
Clik here to view.

Who influences security?

I was contacted last week by a company that specialises in harnessing influence. They claimed to be working for a top IT security solutions vendor and had identified me as a key "influencer" in the UK....

View Article


Image may be NSFW.
Clik here to view.

Is cheating a game a criminal offence ?

  When does cheating in a video game become a criminal matter ? I recently came across this story where by 2 men was accused of “cheating” video poker machines in Las Vegas.In essence they are alledged...

View Article

Image may be NSFW.
Clik here to view.

Fishing for Phishers

We seem to take phishing attacks for granted these days, in much the same way that we’ve accepted spam as a natural, and inevitable, by-product of email. Some experts believe that one of the best...

View Article

Image may be NSFW.
Clik here to view.

Securite Informatique et politique ?

« Tout n'est pas politique, mais la politique s'intéresse à tout » (Nicolas Machiavel). A quelques semaines du premier tour des élections présidentielles, la politique s’intéresse notamment à la...

View Article

Image may be NSFW.
Clik here to view.

Meeting the demands of the contemporary security market

It's been a long time since I last blogged. It's been due to excessive commitments. Freelance work has been thick and fast since the beginning of the year, reflecting an increasingly a robust market...

View Article


Image may be NSFW.
Clik here to view.

Desire Paths and what they tell us about security

I heard an interesting term the  other day “desire path” it is a term used to describe the side paths that often pop up in parks away from the main path that people use as a short cut between the main...

View Article

Image may be NSFW.
Clik here to view.

What's the point of a management system?

My blog posting on OODA loops prompted a response from Andrew Yeomans, pointing out that Deming loops and Boyd loops are not mutually exclusive, i.e. you can have a slow moving management system...

View Article


Image may be NSFW.
Clik here to view.

The Evil Shredder

Shredders, the object of last resort for handling confidential information. Most education and awareness programs tell their users to always use a shredder to dispose of documents so office users ( and...

View Article

Image may be NSFW.
Clik here to view.

DPA Fines – Why ICO Got it Right

 I’ve heard two arguments that are critical of the ICO fines. They go something like this: (1) the fines were too low and (2) it’s wrong of ICO to fine a Local Authority when it didn’t fine Google. Let...

View Article


Image may be NSFW.
Clik here to view.

Securing your Cloud Experience

By Ian Moyse, Sales Director www.workbooks.com , Eurocloud UK Board Member & Cloud Industry Forum Governance Board MemberSecurity is one of the most important factors for companies who want to...

View Article

Image may be NSFW.
Clik here to view.

THE CRM Lottery ‘Will you get the outcome you expect or will you be one of...

Let’s discuss a couple of the heavyweight C words in the IT Sector, Cloud and CRM.What do they have in common? Well they have both certainly provoked a lot of press coverage and airtime, both have...

View Article

Image may be NSFW.
Clik here to view.

Top trends in cloud computing for SMEs

Ian Moyse, Workbooks.com Sales Director, Eurocloud UK Board Member&Cloud Industry Forum Governance Board Member.Following Gartner’s recent report on what it sees as the 5 key trends that will shape...

View Article
Browsing all 25 articles
Browse latest View live


Latest Images