top of page
Search


Did Crowdstrike cause GDPR personal data breaches?
As the dust starts to settle on the Crowdstrike incident, the focus of concern naturally moves on from the immediate incident response...
Stewart Room
Jul 28, 20249 min read
134 views


SEC Cybersecurity Rule 2023 - new transparency rules for corporate governance and incident response
The SEC regulates the securities markets in the US, the biggest and most powerful economy on Earth. Surely, therefore, the SEC is one of...
Stewart Room
Nov 21, 20233 min read
67 views


Bad tech design increases the digital divide. D&I implications for cybersecurity
Touch screen devices are great. From a design perspective they get rid of the mechanical buttons that are riddled with wear-and-tear...
Stewart Room
Nov 7, 20232 min read
17 views


SolarWinds is a cybersecurity game changer
SEC sure SolarWinds and CISO for cybersecurity fraud and controls failings
Stewart Room
Nov 2, 20231 min read
8 views


Biden's AI agenda and the cybersecurity issues and risks
President Biden’s expansive Executive Order on AI is the latest act in the global jockeying for the leadership position in this area. It...
Stewart Room
Nov 1, 20236 min read
42 views


Key legislation. The Communications Act
The security duties for providers of public electronic communications networks and services
Stewart Room
Oct 31, 20234 min read
41 views


Okta breach raises critical concerns about due diligence and accountability
Otka breach impacts authentication in cyberspace, raising due diligence and accountability concerns.
Stewart Room
Oct 27, 20235 min read
58 views


Cryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.
We've explored how cryptography can be used to achieve confidentiality through encryption, so let's turn to data integrity. Integrity is...
Stewart Room
Oct 21, 20233 min read
22 views


Cryptography is the cyberspace's Higgs Boson. Part 1., Encryption.
Symmetric and Public Key encryption for data confidentiality
Stewart Room
Oct 19, 20234 min read
54 views


Is multi factor authentication compulsory in law?
Two factor and multi factor authentication needed for added security and legal compliance
Stewart Room
Oct 17, 20233 min read
162 views
bottom of page