Ransoms and CISOs - charting the best course through treacherous waters
top of page
Search
If you pick up any analyst report about cyber risks, you will be told about the increasing and evolving nature of ransom attacks. A while...
Stewart Room
Nov 7, 20232 min read
Bad tech design increases the digital divide. D&I implications for cybersecurity
Touch screen devices are great. From a design perspective they get rid of the mechanical buttons that are riddled with wear-and-tear...
15 views
Stewart Room
Nov 6, 20231 min read
Is Cybersecurity a line or a circle? The shape impacts the quality of incident incident response
The operational shape of cybersecurity in an organisation is critical to its success and legal health. In light of recent developments such
8 views
Stewart Room
Oct 26, 20233 min read
The cybersecurity ecosystem's raggedy regulatory blanket
The regulatory system for the cybersecurity ecosystem
24 views
Stewart Room
Oct 25, 20234 min read
Where do we find the detail of security law? Part 4.
Operational security builds upon the CIA triad and accidental hazards need controlling as well as malicious and negligent threats.
41 views
Stewart Room
Oct 20, 20233 min read
Where do we find the detail of security law? Part 3.
The detail of security law is found within operational security itself, due to the twinning of the subjects, as explained in Part 1 and...
51 views
Stewart Room
Oct 13, 20234 min read
Data breach claims are successful in the US, so what's this GDPR "gold standard" all about then?
The GDPR is meant to be a global gold standard for data protection but compensation is unlikely after a security breach.
171 views
Stewart Room
Oct 13, 20233 min read
Incident response priorities need multiple lenses and trade-offs
When a cybersecurity breach occurs, operational security law will require an appropriate incident response and the priorities can be...
52 views
Stewart Room
Oct 12, 20235 min read
Cybercrime growth is unstoppable and these are the reasons why ...
Cybercrime is constantly growing and evolving and the advantage is with the attacker. Better security hygiene reduces the risk of being hit.
148 views
Stewart Room
Oct 9, 20232 min read
Why is Cloud the risky option?
The basic argument for Cloud adoption is that it is a better option than anything else, all things considered. Elements within the...
49 views
Stewart Room
Oct 8, 20233 min read
Where do we find the detail of security law? Part 2.
In part 1 of this blog I made the point that security law and security operations are twinned and that if you want to find the detail of...
65 views
Stewart Room
Oct 7, 20233 min read
Where do we find the detail of security law? Part 1.
Security legislation takes us only so far in understanding the law's requirements. We must turn to operational security for the detail.
146 views
bottom of page