Managing software development whilst also ensuring a high security standard is a difficult job for anyone in the security teams. Read this article to understand how the development, opps and security teams can be aligned in order to get the best result all round.
Category: Information Security
Many of you will be aware of the news that Google were given access to healthcare data of up to 1.6 million patients, the encrypted data was shared under an NHS data sharing agreement for the purposes of using google...
As the turmoil around the Panama Papers leak wanes, our attention gradually starts to drift to other headlines. People of power and privilege were engaging in tax avoidance schemes? Has it ever been thus?
What surprised me, though, was how little attention was paid to the ‘how this happened’, in addition to the ‘what happened’. How was the largest data breach, in terms of data volume, enacted? Or are we now so inured to these events that one more is no longer newsworthy?
I think, though, that it’s worth focussing again on what occurred, and what lessons can be learned.
Risk is the potential of gaining or losing something of value. There are two parts to that statement, firstly potential, and the second, value. Sounds simple. And to translate these two components into something that actually means something, these abstract terms need to be made real. They need to resonate with each pair of eyes and ears.