top of page
Search
Stewart Room
Jul 28, 20249 min read
Did Crowdstrike cause GDPR personal data breaches?
As the dust starts to settle on the Crowdstrike incident, the focus of concern naturally moves on from the immediate incident response...
101
Stewart Room
Nov 21, 20233 min read
SEC Cybersecurity Rule 2023 - new transparency rules for corporate governance and incident response
The SEC regulates the securities markets in the US, the biggest and most powerful economy on Earth. Surely, therefore, the SEC is one of...
63
Stewart Room
Nov 19, 20235 min read
Ransoms and CISOs - charting the best course through treacherous waters
If you pick up any analyst report about cyber risks, you will be told about the increasing and evolving nature of ransom attacks. A while...
57
Stewart Room
Nov 15, 20232 min read
NCSC Annual Review - maintaining resilience in an evolving threat landscape
The UK National Cyber Security Centre published its latest annual review earlier this week. If you're ever looking for an organisation...
29
Stewart Room
Nov 8, 20232 min read
Important new case alert! A security breach doesn’t require a circumvention of security controls
If someone says "security breach", what do you think? Is this a situation where a rogue actor (say a cybercriminal) or a rogue thing (say...
149
Stewart Room
Nov 7, 20232 min read
Bad tech design increases the digital divide. D&I implications for cybersecurity
Touch screen devices are great. From a design perspective they get rid of the mechanical buttons that are riddled with wear-and-tear...
15
Stewart Room
Nov 6, 20231 min read
Is Cybersecurity a line or a circle? The shape impacts the quality of incident incident response
The operational shape of cybersecurity in an organisation is critical to its success and legal health. In light of recent developments such
10
Stewart Room
Nov 2, 20231 min read
SolarWinds is a cybersecurity game changer
SEC sure SolarWinds and CISO for cybersecurity fraud and controls failings
8
Stewart Room
Oct 31, 20236 min read
Biden's AI agenda and the cybersecurity issues and risks
President Biden’s expansive Executive Order on AI is the latest act in the global jockeying for the leadership position in this area. It...
42
Stewart Room
Oct 31, 20234 min read
Key legislation. The Communications Act
The security duties for providers of public electronic communications networks and services
32
Stewart Room
Oct 27, 20235 min read
Okta breach raises critical concerns about due diligence and accountability
Otka breach impacts authentication in cyberspace, raising due diligence and accountability concerns.
57
Stewart Room
Oct 26, 20233 min read
The cybersecurity ecosystem's raggedy regulatory blanket
The regulatory system for the cybersecurity ecosystem
24
Stewart Room
Oct 25, 20234 min read
Where do we find the detail of security law? Part 4.
Operational security builds upon the CIA triad and accidental hazards need controlling as well as malicious and negligent threats.
41
Stewart Room
Oct 24, 20234 min read
Key legislation. The Computer Misuse Act
The Computer Misuse Act is the UK's principal "anti-hacking" legislation. Learn more about cyber-dependent and cyber-enabled computer crimes
203
Stewart Room
Oct 21, 20233 min read
Cryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.
We've explored how cryptography can be used to achieve confidentiality through encryption, so let's turn to data integrity. Integrity is...
20
Stewart Room
Oct 20, 20233 min read
Where do we find the detail of security law? Part 3.
The detail of security law is found within operational security itself, due to the twinning of the subjects, as explained in Part 1 and...
52
Stewart Room
Oct 19, 20234 min read
Cryptography is the cyberspace's Higgs Boson. Part 1., Encryption.
Symmetric and Public Key encryption for data confidentiality
53
Stewart Room
Oct 18, 20236 min read
Equifax fine highlights supply chain and incident response risks
Supply chain risks and incident response priorities exposed by Equifax cybersecurity data breach fine.
114
Stewart Room
Oct 17, 20233 min read
Is multi factor authentication compulsory in law?
Two factor and multi factor authentication needed for added security and legal compliance
158
Stewart Room
Oct 17, 20235 min read
Key legislation. The General Data Protection Regulation
The GDPR is a critical piece of security law requiring end to end security over the full personal data processing lifecycle
114
Stewart Room
Oct 13, 20234 min read
Data breach claims are successful in the US, so what's this GDPR "gold standard" all about then?
The GDPR is meant to be a global gold standard for data protection but compensation is unlikely after a security breach.
174
Stewart Room
Oct 13, 20233 min read
Incident response priorities need multiple lenses and trade-offs
When a cybersecurity breach occurs, operational security law will require an appropriate incident response and the priorities can be...
55
Stewart Room
Oct 12, 20235 min read
Cybercrime growth is unstoppable and these are the reasons why ...
Cybercrime is constantly growing and evolving and the advantage is with the attacker. Better security hygiene reduces the risk of being hit.
151
Stewart Room
Oct 10, 20236 min read
Litigation risk after a cyber-attack
If an organisation falls victim to a cyber-attack where the cybercriminal manages to impact information that the organisation holds on...
203
bottom of page