Stewart RoomNov 8, 20232 min readICOImportant new case alert! A security breach doesn’t require a circumvention of security controlsIf someone says "security breach", what do you think? Is this a situation where a rogue actor (say a cybercriminal) or a rogue thing (say...
Stewart RoomOct 31, 20234 min readLegislationKey legislation. The Communications ActThe security duties for providers of public electronic communications networks and services
Stewart RoomOct 21, 20233 min readCryptographyCryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.We've explored how cryptography can be used to achieve confidentiality through encryption, so let's turn to data integrity. Integrity is...
Stewart RoomOct 17, 20233 min readControlsIs multi factor authentication compulsory in law?Two factor and multi factor authentication needed for added security and legal compliance
Stewart RoomOct 17, 20235 min readLegislationKey legislation. The General Data Protection RegulationThe GDPR is a critical piece of security law requiring end to end security over the full personal data processing lifecycle
Stewart RoomOct 8, 20233 min readPhilosophyWhere do we find the detail of security law? Part 2.In part 1 of this blog I made the point that security law and security operations are twinned and that if you want to find the detail of...