How does your security measure up?

I published this article on LinkedIn on Monday 3rd July 2017, and I’ve copied it here for you. If you don’t know what you have, how can you measure it? We read a lot these days about equipment and training to help combat cyber attacks and reduce risks, but I don’t see much about today’s … Continue reading How does your security measure up?

Lesson to be learned from Wannacry Friday

This article was published on LinkedIn on 16th May 2017. I’ve copied it in its entirety for you here.  If you don’t know what you have, how can you protect it effectively? Last Friday, the world received a massive wake up call, in regards to the vulnerability of it’s computer systems, their interconnectedness and the … Continue reading Lesson to be learned from Wannacry Friday

Global Cyber Attack 

Yesterday, May 12th 2017 saw a mass global cyber attack launched with impeccable timing just before the weekend. Over 75000 machines were affected in around 100 countries – so far.  It is believed that a hacking group called Shadow Crew is behind the attack. This is the same group that hacked the CIA in the … Continue reading Global Cyber Attack 

To certify or not

I published this article on LinkedIn on May 3rd 2017. Here it is in its entirety for you. The age old question of whether certification is important or not reared its head again recently. I was talking to two prospective clients, and they held opposing views. One wanted their staff to be well trained, but … Continue reading To certify or not

Cyber Security is Doomed

I published this article on LinkedIn on March 23rd 2017, and rather than post a link to it I thought I’d share it here.  Yes, I know that was a controversial headline deliberately cast to lure you into reading this article, but it’s also true: now I’ll tell you why.  Cast your minds back to … Continue reading Cyber Security is Doomed

Who should the CISO report to?

This article appeared on LinkedIn on 25th April 2017. Rather than publish a link to that post, I thought I’d repost the whole thing here.   This question caused a lot of head scratching in the past, and it continues to be a very contentious issue.  Historically, the Chief Information Security Officer (CISO) has typically … Continue reading Who should the CISO report to?

Shiny kit isn’t always what you need

This article appeared on LinkedIn on 5th April 2017, and you can read it in full here.  Earlier this week I saw an item on LinkedIn where someone was asking advice about building a SOC (Security Operations Centre). It set me thinking that often we see a great clamour for solutions, for the latest shiny … Continue reading Shiny kit isn’t always what you need

Cyber Essentials and ISO 27001 explained

At some point in your working life, you’ll probably come across these two terms, and you may want to know more about them. Look no further than this article on LinkedIn, where I’ve gone into a bit of detail about the two, what their similarities are, what the key differences are, and I’ve even given … Continue reading Cyber Essentials and ISO 27001 explained

Addressing the Security Skills Gap

Addressing the Security Skills Gap was published by me on LinkedIn in January 2017.  It was born out of discussions I’d seen online about whether there was a shortage of appropriately skilled people or not: I believe there is. If you want to find me on LinkedIn, check out my details on the About Me … Continue reading Addressing the Security Skills Gap