Breaking Down Cybersecurity: The Real Meaning Behind the Jargon — Matt PalmerWhat really is cyber security, and why doesn’t the traditional CIA triad of confidentiality, integrity, and availability work?Apr 27, 2024Apr 27, 2024
Does cyber security need a legislative response?Building castles in the sand simply isn’t working to hold back the tide of cyber threats. We’re responding with a new Law.Mar 11, 2024Mar 11, 2024
What does a good password policy really look like? — Matt PalmerPassword best practice advice is generic, well accepted, and often repeated dogma. But is it right?Feb 25, 2024Feb 25, 2024
What can we learn from last year’s cyber attack on MGM?On September 12, 2023, MGM Resorts International experienced a cyber attack. Here are the steps that could have stopped it.Feb 14, 2024Feb 14, 2024
March 2017 Equifax data breach: Lessons to learn for business leadersThe Equifax data breach of March 2017 was one of the most publicized cybersecurity incidents in recent years. Millions of people had their…Feb 9, 2024Feb 9, 2024
Cyber security assurance: What is right for my business?Cyber security can be complex enough without adding compliance and assurance obligations. Yet without these, it is unlikely a security…Feb 2, 2024Feb 2, 2024
Cyber attacks on the education section: What can we learn?In 2023, schools saw a noticeable surge in cyber attacks. Various institutions across the US and UK have been targeted by hackers that…Feb 1, 2024Feb 1, 2024
How does a cyber incident feel?There’s lots of documentation out there to help with cyber security incident response, but sometimes it’s not what you do that matters, but…Feb 1, 2024Feb 1, 2024
Our kids will share a world with Artificial Intelligence.I wrote my first attempt at an AI simulator at the age of 14 or 15, in BASIC on a 2nd hand IBM 386 laptop running MS-DOS 4, after reading…Jul 25, 2023Jul 25, 2023
AI as a force for goodArtificial Intelligence brings big new risks, but what is the rest of the story? AI can be a ‘force for good’.Jul 24, 2023Jul 24, 2023