Security
By Admin / 2018-10-29

Cyber Security and Herd Immunity

Improved hygiene and large-scale vaccination programmes have been shown effective in preventing the transmission of infections. In addition to conferring...

Read More
Security
By Admin / 2018-10-11

Cyber security as an enabler for innovation

Innovation is critical to the ability of any organisation to continue to compete against its peers by attracting elevated consumer...

Read More
Security
By Admin / 2018-10-02

‘Uberisation’ – a sign of things to come?

In consulting, travels are unfortunately an occupational hazard, and I have used quite a few Ubers. Until automation takes over,...

Read More
Security
By Admin / 2018-07-06

Cybersecurity: what is the best solution?

An organisation’s cybersecurity strategy acts as the ‘glue’, or perhaps the ‘why’ for an entire programme; but a question I’ve...

Read More
Security
By Admin / 2018-06-07

“I was hacked”… or “how I was an idiot and forgot Two-Factor Authentication…..”

When I first realised my Instagram had been hacked, my first thought (other than, I really hope no one finds...

Read More
Security
By Admin / 2018-05-15

Artificial Intelligence in healthcare, an intelligent way forward?

We may be a victim of our own success with regards to healthcare. Improved scientific understanding and ever-diligent, we are...

Read More
Security
By Admin / 2018-04-04

Data, the new gold or the new wild west?

“Data is the new gold” the oft-quoted phrase used to describe the importance of data in the 21stcentury. The origin...

Read More
Security
By Admin / 2018-03-14

The bugs bite back

Ransomware attacks, the most notable of recent times being WannaCry and NotPetya, have barely been out of the news. WannaCry...

Read More
Security
By Admin / 2018-03-07

Dinner at the Arctic Circle

Despite the red weather warning from Storm Emma, a group of cybersecurity leaders and start-ups gathered for a roundtable evening...

Read More
Security
By Admin / 2018-02-26

Finance in the cloud – the shipping forecast

With a great many businesses now adopting a ‘cloud first’ IT strategy, worldwide spending on cloud is expected to more...

Read More
Security
By Admin / 2018-01-26

GDPR – Getting your Ducks on Parade for Regulation

For any organisation, it is a numbers game; GDPR, the most important new regulation in decades, will certainly give them...

Read More
Security
By Admin / 2017-12-18

Snow White and the seven cryptocurrency miners

Hi Ho-oo-oo! Hi Ho-oo-oo! Hi ho, hi ho, it’s off to work in the Data Centre we go! Deep in the...

Read More
Security
By Admin / 2017-11-30

Lost in the woods – tales of wandering data

In an age of hyper-connectivity, it is almost refreshing to see that not all data breaches result from the compromise...

Read More
Security
By Admin / 2017-11-30

Cyber Security and Healthcare, Uncomfortable Bedfellows?

The duty of a healthcare professional is to treat the patient in front of them. Increasingly, this is assisted by...

Read More
Security
By Admin / 2017-10-11

Towards a secure mindset

The gatherings of the hacker community at Black Hat and Def Con have provided opportunities to survey professionals with their...

Read More
Security
By Admin / 2017-08-21

Information Security Investments for 2017

The latest Gartner report has estimated 2017 spend on cybersecurity to be $86 billion, with a trend towards an Opex...

Read More
Security
By Admin / 2017-07-31

Defenders and attackers – economic asymmetry in cybersecurity

Even before they start, the odds are stacked against the defenders. Modern infrastructures must support a large number of internal...

Read More
Security
By Admin / 2017-06-15

How many clouds do you need?

Traditionally, enterprise-owned data centres were the predominant provider of an organisation’s services. These can be considered to be “private clouds”,...

Read More
Security
By Admin / 2017-05-22

IAM in Healthcare

It was perhaps no coincidence that amongst the first victims of the WannaCry ransomware were NHS hospitals in the UK....

Read More
Security
By Admin / 2017-04-04

Big data – our saviour or just trying to find a needle in the haystack?

Numerous publications have described using big data analytics, but there is still misunderstanding on what it is, its origins and...

Read More
watching you
Security
By Admin / 2017-03-22

Who is trying to watch you? IAM

Who are you? Identity & Access Management. Traditionally, IAM is used to authenticate system users before granting them with access...

Read More
Security
By Admin / 2016-12-04

IOT3 – Internet of Things, Threats and Terrestrials

The Internet of Things (IoT1) From smartphones to vehicles to medical devices to networked light bulbs and smart meters, connected...

Read More