top of page
Search


Important new case alert! A security breach doesn’t require a circumvention of security controls
If someone says "security breach", what do you think? Is this a situation where a rogue actor (say a cybercriminal) or a rogue thing (say...
Stewart Room
Nov 8, 20232 min read
149 views


Key legislation. The Communications Act
The security duties for providers of public electronic communications networks and services
Stewart Room
Oct 31, 20234 min read
41 views


Cryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.
We've explored how cryptography can be used to achieve confidentiality through encryption, so let's turn to data integrity. Integrity is...
Stewart Room
Oct 21, 20233 min read
22 views


Is multi factor authentication compulsory in law?
Two factor and multi factor authentication needed for added security and legal compliance
Stewart Room
Oct 17, 20233 min read
162 views


Key legislation. The General Data Protection Regulation
The GDPR is a critical piece of security law requiring end to end security over the full personal data processing lifecycle
Stewart Room
Oct 17, 20235 min read
114 views


Where do we find the detail of security law? Part 2.
In part 1 of this blog I made the point that security law and security operations are twinned and that if you want to find the detail of...
Stewart Room
Oct 8, 20233 min read
67 views
bottom of page