All digital transformation initiatives introduce new problems, software bugs, guaranteed network vulnerabilities, new competitors; new business challenges and new stresses. The elimination of all negative consequences and vulnerabilities are impossible, so our focus should be on limiting and containing it, not eliminating it.
Category: Information Security
Managing software development whilst also ensuring a high security standard is a difficult job for anyone in the security teams. Read this article to understand how the development, opps and security teams can be aligned in order to get the best result all round.
Many of you will be aware of the news that Google were given access to healthcare data of up to 1.6 million patients, the encrypted data was shared under an...
As the turmoil around the Panama Papers leak wanes, our attention gradually starts to drift to other headlines. People of power and privilege were engaging in tax avoidance schemes? Has it ever been thus?
What surprised me, though, was how little attention was paid to the ‘how this happened’, in addition to the ‘what happened’. How was the largest data breach, in terms of data volume, enacted? Or are we now so inured to these events that one more is no longer newsworthy?
I think, though, that it’s worth focussing again on what occurred, and what lessons can be learned.