top of page
Search


Ransoms and CISOs - charting the best course through treacherous waters
If you pick up any analyst report about cyber risks, you will be told about the increasing and evolving nature of ransom attacks. A while...
Stewart Room
Nov 19, 20235 min read
Â
Â


Important new case alert! A security breach doesn’t require a circumvention of security controls
If someone says "security breach", what do you think? Is this a situation where a rogue actor (say a cybercriminal) or a rogue thing (say...
Stewart Room
Nov 8, 20232 min read
Â
Â


Okta breach raises critical concerns about due diligence and accountability
Otka breach impacts authentication in cyberspace, raising due diligence and accountability concerns.
Stewart Room
Oct 27, 20235 min read
Â
Â


Equifax fine highlights supply chain and incident response risks
Supply chain risks and incident response priorities exposed by Equifax cybersecurity data breach fine.
Stewart Room
Oct 18, 20236 min read
Â
Â


Key legislation. The General Data Protection Regulation
The GDPR is a critical piece of security law requiring end to end security over the full personal data processing lifecycle
Stewart Room
Oct 17, 20235 min read
Â
Â


Incident response priorities need multiple lenses and trade-offs
When a cybersecurity breach occurs, operational security law will require an appropriate incident response and the priorities can be...
Stewart Room
Oct 13, 20233 min read
Â
Â
bottom of page


