Category: Information Security

IoT

Are you managing ‘Shadow IoT’ in your organisation?

Barely a day goes by without another report of poorly implemented security in ‘smart’ IoT devices used to control lights, heating etc, whether it’s an inherent design flaw or simply bad practice during installation. A recent survey into security in Building Automation Systems revealed that whilst 86% of systems are connected to the Internet in some way, and over half the respondents thought an attack could do significant harm to the organisation, only 29% had implemented security systems around their BAS.

Boundless Computing, Unbounded IT

Workload mobility and the need to maintain SLAs will be a defining feature of Unbounded IT and it is in the sphere of Cyber and Information security where I think the business will first force IT to reevaluate some its most deeply held dogmas and static thinking.

Enterprise IT in 2020: A Minimal Viable Vision III

  IT Next Generation of Cyber Security The traditional forms of security SAST, DAST and WAF which are reactive and focus on treating symptoms rather than affecting a cure will, in a perimeterless world, result in fast diminishing returns. Some of these...

Digital Transformation – The Dark Side

All digital transformation initiatives introduce new problems, software bugs, guaranteed network vulnerabilities, new competitors; new business challenges and new stresses. The elimination of all negative consequences and vulnerabilities are impossible, so our focus should be on limiting and containing it, not eliminating it.