top of page
Search
Stewart Room
Jul 28, 20249 min read
Did Crowdstrike cause GDPR personal data breaches?
As the dust starts to settle on the Crowdstrike incident, the focus of concern naturally moves on from the immediate incident response...
101 views
Stewart Room
Nov 21, 20233 min read
SEC Cybersecurity Rule 2023 - new transparency rules for corporate governance and incident response
The SEC regulates the securities markets in the US, the biggest and most powerful economy on Earth. Surely, therefore, the SEC is one of...
63 views
Stewart Room
Nov 7, 20232 min read
Bad tech design increases the digital divide. D&I implications for cybersecurity
Touch screen devices are great. From a design perspective they get rid of the mechanical buttons that are riddled with wear-and-tear...
15 views
Stewart Room
Nov 2, 20231 min read
SolarWinds is a cybersecurity game changer
SEC sure SolarWinds and CISO for cybersecurity fraud and controls failings
8 views
Stewart Room
Oct 31, 20236 min read
Biden's AI agenda and the cybersecurity issues and risks
President Biden’s expansive Executive Order on AI is the latest act in the global jockeying for the leadership position in this area. It...
42 views
Stewart Room
Oct 31, 20234 min read
Key legislation. The Communications Act
The security duties for providers of public electronic communications networks and services
32 views
Stewart Room
Oct 27, 20235 min read
Okta breach raises critical concerns about due diligence and accountability
Otka breach impacts authentication in cyberspace, raising due diligence and accountability concerns.
57 views
Stewart Room
Oct 21, 20233 min read
Cryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.
We've explored how cryptography can be used to achieve confidentiality through encryption, so let's turn to data integrity. Integrity is...
20 views
Stewart Room
Oct 19, 20234 min read
Cryptography is the cyberspace's Higgs Boson. Part 1., Encryption.
Symmetric and Public Key encryption for data confidentiality
53 views
Stewart Room
Oct 17, 20233 min read
Is multi factor authentication compulsory in law?
Two factor and multi factor authentication needed for added security and legal compliance
158 views
bottom of page