I published this article on LinkedIn on Monday 3rd July 2017, and I’ve copied it here for you. If you don’t know what you have, how can you measure it? We read a lot these days about equipment and training to help combat cyber attacks and reduce risks, but I don’t see much about today’s … Continue reading How does your security measure up?
This article was published on LinkedIn on 16th May 2017. I’ve copied it in its entirety for you here. If you don’t know what you have, how can you protect it effectively? Last Friday, the world received a massive wake up call, in regards to the vulnerability of it’s computer systems, their interconnectedness and the … Continue reading Lesson to be learned from Wannacry Friday
Yesterday, May 12th 2017 saw a mass global cyber attack launched with impeccable timing just before the weekend. Over 75000 machines were affected in around 100 countries – so far. It is believed that a hacking group called Shadow Crew is behind the attack. This is the same group that hacked the CIA in the … Continue reading Global Cyber Attack
I published this article on LinkedIn on May 3rd 2017. Here it is in its entirety for you. The age old question of whether certification is important or not reared its head again recently. I was talking to two prospective clients, and they held opposing views. One wanted their staff to be well trained, but … Continue reading To certify or not
I published this article on LinkedIn on March 23rd 2017, and rather than post a link to it I thought I’d share it here. Yes, I know that was a controversial headline deliberately cast to lure you into reading this article, but it’s also true: now I’ll tell you why. Cast your minds back to … Continue reading Cyber Security is Doomed
This article appeared on LinkedIn on 25th April 2017. Rather than publish a link to that post, I thought I’d repost the whole thing here. This question caused a lot of head scratching in the past, and it continues to be a very contentious issue. Historically, the Chief Information Security Officer (CISO) has typically … Continue reading Who should the CISO report to?
This article appeared on LinkedIn on 5th April 2017, and you can read it in full here. Earlier this week I saw an item on LinkedIn where someone was asking advice about building a SOC (Security Operations Centre). It set me thinking that often we see a great clamour for solutions, for the latest shiny … Continue reading Shiny kit isn’t always what you need
Ever wondered how you can be healthy and a bit of a security geek? In this article on LinkedIn I explain how you can be both. What do you think?
At some point in your working life, you’ll probably come across these two terms, and you may want to know more about them. Look no further than this article on LinkedIn, where I’ve gone into a bit of detail about the two, what their similarities are, what the key differences are, and I’ve even given … Continue reading Cyber Essentials and ISO 27001 explained
Addressing the Security Skills Gap was published by me on LinkedIn in January 2017. It was born out of discussions I’d seen online about whether there was a shortage of appropriately skilled people or not: I believe there is. If you want to find me on LinkedIn, check out my details on the About Me … Continue reading Addressing the Security Skills Gap