Ransoms and CISOs - charting the best course through treacherous waters
top of page
Search
If you pick up any analyst report about cyber risks, you will be told about the increasing and evolving nature of ransom attacks. A while...
Stewart Room
- Nov 7, 2023
- 2 min
Bad tech design increases the digital divide. D&I implications for cybersecurity
Touch screen devices are great. From a design perspective they get rid of the mechanical buttons that are riddled with wear-and-tear...
15 views
Stewart Room
- Nov 6, 2023
- 1 min
Is Cybersecurity a line or a circle? The shape impacts the quality of incident incident response
The operational shape of cybersecurity in an organisation is critical to its success and legal health. In light of recent developments such
8 views
Stewart Room
- Oct 26, 2023
- 3 min
The cybersecurity ecosystem's raggedy regulatory blanket
The regulatory system for the cybersecurity ecosystem
24 views
Stewart Room
- Oct 25, 2023
- 4 min
Where do we find the detail of security law? Part 4.
Operational security builds upon the CIA triad and accidental hazards need controlling as well as malicious and negligent threats.
40 views
Stewart Room
- Oct 20, 2023
- 3 min
Where do we find the detail of security law? Part 3.
The detail of security law is found within operational security itself, due to the twinning of the subjects, as explained in Part 1 and...
51 views
Stewart Room
- Oct 13, 2023
- 4 min
Data breach claims are successful in the US, so what's this GDPR "gold standard" all about then?
The GDPR is meant to be a global gold standard for data protection but compensation is unlikely after a security breach.
170 views
Stewart Room
- Oct 13, 2023
- 3 min
Incident response priorities need multiple lenses and trade-offs
When a cybersecurity breach occurs, operational security law will require an appropriate incident response and the priorities can be...
52 views
Stewart Room
- Oct 12, 2023
- 5 min
Cybercrime growth is unstoppable and these are the reasons why ...
Cybercrime is constantly growing and evolving and the advantage is with the attacker. Better security hygiene reduces the risk of being hit.
146 views
Stewart Room
- Oct 9, 2023
- 2 min
Why is Cloud the risky option?
The basic argument for Cloud adoption is that it is a better option than anything else, all things considered. Elements within the...
49 views
Stewart Room
- Oct 8, 2023
- 3 min
Where do we find the detail of security law? Part 2.
In part 1 of this blog I made the point that security law and security operations are twinned and that if you want to find the detail of...
65 views
Stewart Room
- Oct 7, 2023
- 3 min
Where do we find the detail of security law? Part 1.
Security legislation takes us only so far in understanding the law's requirements. We must turn to operational security for the detail.
144 views
bottom of page