Ubiquitous and permanently connected to the internet, smartphones are here to stay. As devices that talk to everything all of the time, they access corporate data more easily whilst boundaries to the company network blur or even disappear. Imagine: Joe from Accounts procures his new iPhone as part of his renewed contract and one of the first things he does after restoring the backup of…
Security Through Maturity
How's your posture?
Moving to a more mature security posture?
Intended to be topical and informative, my blog contains lightweight discussions around various Cyber Security issues.
-
Had a great time @Sophos Discover Lisbon last week. Some amazing new technologies on the horizon, can't wait to get stuck in! Thank you! May 20th, 2017
-
What can we learn from the BA outage?Jun 15th, 2017
-
Is your Incident Management like Dad’s Army?Jun 7th, 2017
-
Thoughts on HSBC voice recognition…Jun 1st, 2017
-
Is Password Management software secure?May 25th, 2017
-
Is my business vulnerable to WannaCry?May 19th, 2017
Application Whitelisting
AppLocker
Board
BYOD
Cloud
Compliance
Confidentiality
Cyber Attack
Data Breach
Data Protection
Encryption
Firewall
GDPR
Home and Mobile Working
Hotspot
Incident Response
Information Risk Management
IoT
Log Management
Malvertising
MDM
Mobile Device Management
Mobile Working
Monitoring
Password Management
Passwords
Phishing
Privacy
Ransomware
Remote Access
Risk Assessment
Risk Management
Road Warrior
SIEM
Smartphone
Social Engineering
SRP
Training
Travelling
Updates
User Privileges
VPN
Vulnerability
Vulnerability Scans
Wi-Fi