Risk Management with Stuart King and Duncan Hart:

July, 2008

July 31, 2008  9:41 PM

Where do we spend the money?

sking2 Profile: sking2
Network security, Security management, Web product security

I was involved in a debate today where three opposing views were being taken with regards to implementing a hypothetical new online application. Given a limited budget, should most of the money be directed towards network, application or data security?

Personally I believe...

July 30, 2008  6:30 PM

McKinnon – fair enough?

sking2 Profile: sking2
Misc, Security management

I was less than complimentary about Gary Mckinnon on this blog a short while ago and I've not changed my opinion. For obvious reasons, I have little sympathy for hackers regardless of their...

July 30, 2008  5:00 AM

Shooting the messenger

sking2 Profile: sking2
Security management

An article by Wendy Goucher in the latest edition of the Computer Fraud & Security Journal entitled "Shooting the Messenger"  caught my attention. It discusses organisational blame culture around reporting of information...

July 28, 2008  11:00 AM

In The Cloud – Risk and Opportunity

sking2 Profile: sking2
Network security, Security management

If you pick up this weeks edition of Computer Weekly, on page 10 in the My Take column you will read that I describe "In the Cloud" computing as being the new black. Gartner refer to it as an emerging phenomenon while on the Cloud Computer blog at

July 24, 2008  1:00 PM

Security Awareness – Don’t make private business public

sking2 Profile: sking2
Security management, Useful Links

I've been watching a security awareness training video produced for a well known blue-chip company. It's appallingly bad.  All the very worst Janet and John material that generally makes people's eyes glaze over and wonder whether they've left the gas on or have enough eggs left...

July 23, 2008  9:00 AM

Information Security Cost Cutting – Part 2

sking2 Profile: sking2
Security management

I wrote some of my views on information security cost cutting a couple of weeks ago. You can read them here:

July 21, 2008  8:03 PM

Oyster Card Hack to be Published

sking2 Profile: sking2


"In its ruling, the court said: 'Damage to NXP is not the result of the publication of the article but of the production and sale of a chip that appears to have...

July 21, 2008  10:15 AM

10 of the Biggest Platform Development Mistakes

sking2 Profile: sking2
Network security, Security management, Web product security

Timely and interesting read online here: http://gigaom.com/2008/06/30/10-of-the-biggest-platform-development-mistakes/, listing the 10 most commonly observed platform development mistakes. A few items in...

July 16, 2008  5:00 AM

Insider locks out San Francisco WAN

sking2 Profile: sking2
Security management

From SCMagazine

Network administrators in San Francisco could not access the city's new wide area network (WAN) because a disgruntled engineer refused to divulge his exclusive...

July 15, 2008  12:00 PM

More on China – Fame and Glory?

sking2 Profile: sking2
Misc, Security management

An article on the subject of Chinese hackers from Bruce Schneier here.

Bruce makes a case that the hackers are not being sponsored by their government but are, in fact, in this for two...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: