top of page
Search
Stewart Room
Nov 8, 20232 min read
Important new case alert! A security breach doesn’t require a circumvention of security controls
If someone says "security breach", what do you think? Is this a situation where a rogue actor (say a cybercriminal) or a rogue thing (say...
149 views
Stewart Room
Oct 31, 20234 min read
Key legislation. The Communications Act
The security duties for providers of public electronic communications networks and services
32 views
Stewart Room
Oct 21, 20233 min read
Cryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.
We've explored how cryptography can be used to achieve confidentiality through encryption, so let's turn to data integrity. Integrity is...
20 views
Stewart Room
Oct 17, 20233 min read
Is multi factor authentication compulsory in law?
Two factor and multi factor authentication needed for added security and legal compliance
157 views
Stewart Room
Oct 17, 20235 min read
Key legislation. The General Data Protection Regulation
The GDPR is a critical piece of security law requiring end to end security over the full personal data processing lifecycle
114 views
Stewart Room
Oct 8, 20233 min read
Where do we find the detail of security law? Part 2.
In part 1 of this blog I made the point that security law and security operations are twinned and that if you want to find the detail of...
67 views
bottom of page