top of page
Search


Ransoms and CISOs - charting the best course through treacherous waters
If you pick up any analyst report about cyber risks, you will be told about the increasing and evolving nature of ransom attacks. A while...
Stewart Room
Nov 19, 20235 min read
60 views


Bad tech design increases the digital divide. D&I implications for cybersecurity
Touch screen devices are great. From a design perspective they get rid of the mechanical buttons that are riddled with wear-and-tear...
Stewart Room
Nov 7, 20232 min read
17 views


Is Cybersecurity a line or a circle? The shape impacts the quality of incident incident response
The operational shape of cybersecurity in an organisation is critical to its success and legal health. In light of recent developments such
Stewart Room
Nov 6, 20231 min read
10 views


The cybersecurity ecosystem's raggedy regulatory blanket
The regulatory system for the cybersecurity ecosystem
Stewart Room
Oct 26, 20233 min read
24 views


Where do we find the detail of security law? Part 4.
Operational security builds upon the CIA triad and accidental hazards need controlling as well as malicious and negligent threats.
Stewart Room
Oct 25, 20234 min read
41 views


Where do we find the detail of security law? Part 3.
The detail of security law is found within operational security itself, due to the twinning of the subjects, as explained in Part 1 and...
Stewart Room
Oct 20, 20233 min read
52 views


Data breach claims are successful in the US, so what's this GDPR "gold standard" all about then?
The GDPR is meant to be a global gold standard for data protection but compensation is unlikely after a security breach.
Stewart Room
Oct 13, 20234 min read
174 views


Incident response priorities need multiple lenses and trade-offs
When a cybersecurity breach occurs, operational security law will require an appropriate incident response and the priorities can be...
Stewart Room
Oct 13, 20233 min read
55 views


Cybercrime growth is unstoppable and these are the reasons why ...
Cybercrime is constantly growing and evolving and the advantage is with the attacker. Better security hygiene reduces the risk of being hit.
Stewart Room
Oct 12, 20235 min read
177 views


Why is Cloud the risky option?
The basic argument for Cloud adoption is that it is a better option than anything else, all things considered. Elements within the...
Stewart Room
Oct 9, 20232 min read
49 views


Where do we find the detail of security law? Part 2.
In part 1 of this blog I made the point that security law and security operations are twinned and that if you want to find the detail of...
Stewart Room
Oct 8, 20233 min read
67 views


Where do we find the detail of security law? Part 1.
Security legislation takes us only so far in understanding the law's requirements. We must turn to operational security for the detail.
Stewart Room
Oct 7, 20233 min read
146 views
bottom of page