Risk Management with Stuart King and Duncan Hart:

June, 2008

June 27, 2008  10:29 AM

Poynter Report

sking2 Profile: sking2
Security management

The Poynter Report into the HMRC incident and subsequent investigation is an excellent insight and a great case-study in Information Security management.

Surprisingly (at least to me) was the fact that the...

June 26, 2008  10:00 AM

Web based email and a prediction for the future

sking2 Profile: sking2
Compliance, Security management, Web product security

I've been following an interesting Q&A thread on LinkedIn where the question is asked "Should business messages be allowed to flow through personal/webmail services?"

What's interesting to note is the difference in opinion between the more...

June 25, 2008  8:40 AM

Virgin Media Security Incident

sking2 Profile: sking2
Security management

News that Virgin Media is conducting an internal inquiry into why 3,000 customers' bank details were burned to a CD which was then lost passed with...

June 24, 2008  11:43 AM

Social networking pros and cons

sking2 Profile: sking2
Security management

The social networking security debate continues. Not just a debate, but a heated debate. I like those the best!

Since I work for an organisation that is...

June 24, 2008  7:00 AM

NHS Password Sharing and Business Requirements

sking2 Profile: sking2
Network security, Security management

I was reading with interest Tony Collin's blog on password sharing in the NHS. In my view the problem is that the system being used was not designed to take into account the way that...

June 23, 2008  7:00 AM

IT snooping – what is your team looking at?

sking2 Profile: sking2
Network security, Security management

A recent survey from Cyber-Ark Software reveals the following information

Whilst you sit there innocently working away, little do you realize that a third of your IT...

June 23, 2008  6:00 AM

Internet coffee machine hacked

sking2 Profile: sking2

Given all the world's problems: famine, disease, war and so on, thank goodness somebody has come up with the answer to it all. Yes, finally, a coffee machine that can be connected to the Internet. Phew, and there I was thinking that we were all goners.

Of course, life's not quite so easy...

June 22, 2008  7:46 PM

AV industry sucks

sking2 Profile: sking2
malware, Network security

So says the CEO of Trend Micro, Eva Chen, in this new interview where she describes how a cloud-client architecture is the solution to stop malware.

It's good to finally see one of the large...

June 20, 2008  5:31 AM

Broad principles and guaranteed security

sking2 Profile: sking2
Security management, Web product security

I've been looking at the security and risk associated with the development of a new web platform. On asking the lead developer to show me some basic documentation (an architecture diagram and functional spec) I received the following reply in my...

June 19, 2008  7:00 AM

Security scare insight

sking2 Profile: sking2
Security management

An excellent and insightful blog from one Peter Cochrane who describes what happened when he mislaid a couple of hard drives containing more than 100GB of information. Read it here:


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: