IT Next Generation of Cyber Security The traditional forms of security SAST, DAST and WAF which are reactive and focus on treating symptoms rather than affecting a cure will, in...
Category: Information Security
All digital transformation initiatives introduce new problems, software bugs, guaranteed network vulnerabilities, new competitors; new business challenges and new stresses. The elimination of all negative consequences and vulnerabilities are impossible, so our focus should be on limiting and containing it, not eliminating it.
Managing software development whilst also ensuring a high security standard is a difficult job for anyone in the security teams. Read this article to understand how the development, opps and security teams can be aligned in order to get the best result all round.
Many of you will be aware of the news that Google were given access to healthcare data of up to 1.6 million patients, the encrypted data was shared under an...
As the turmoil around the Panama Papers leak wanes, our attention gradually starts to drift to other headlines. People of power and privilege were engaging in tax avoidance schemes? Has it ever been thus?
What surprised me, though, was how little attention was paid to the ‘how this happened’, in addition to the ‘what happened’. How was the largest data breach, in terms of data volume, enacted? Or are we now so inured to these events that one more is no longer newsworthy?
I think, though, that it’s worth focussing again on what occurred, and what lessons can be learned.
Risk is the potential of gaining or losing something of value. There are two parts to that statement, firstly potential, and the second, value. Sounds simple. And to translate these two components into something that actually means something, these abstract terms need to be made real. They need to resonate with each pair of eyes and ears.