Breaking Down Cybersecurity: The Real Meaning Behind the Jargon — Matt PalmerWhat really is cyber security, and why doesn’t the traditional CIA triad of confidentiality, integrity, and availability work?Apr 27Apr 27
Does cyber security need a legislative response?Building castles in the sand simply isn’t working to hold back the tide of cyber threats. We’re responding with a new Law.Mar 11Mar 11
What does a good password policy really look like? — Matt PalmerPassword best practice advice is generic, well accepted, and often repeated dogma. But is it right?Feb 25Feb 25
What can we learn from last year’s cyber attack on MGM?On September 12, 2023, MGM Resorts International experienced a cyber attack. Here are the steps that could have stopped it.Feb 14Feb 14
March 2017 Equifax data breach: Lessons to learn for business leadersThe Equifax data breach of March 2017 was one of the most publicized cybersecurity incidents in recent years. Millions of people had their…Feb 9Feb 9
Cyber security assurance: What is right for my business?Cyber security can be complex enough without adding compliance and assurance obligations. Yet without these, it is unlikely a security…Feb 2Feb 2
Cyber attacks on the education section: What can we learn?In 2023, schools saw a noticeable surge in cyber attacks. Various institutions across the US and UK have been targeted by hackers that…Feb 1Feb 1
How does a cyber incident feel?There’s lots of documentation out there to help with cyber security incident response, but sometimes it’s not what you do that matters, but…Feb 1Feb 1
Our kids will share a world with Artificial Intelligence.I wrote my first attempt at an AI simulator at the age of 14 or 15, in BASIC on a 2nd hand IBM 386 laptop running MS-DOS 4, after reading…Jul 25, 2023Jul 25, 2023
AI as a force for goodArtificial Intelligence brings big new risks, but what is the rest of the story? AI can be a ‘force for good’.Jul 24, 2023Jul 24, 2023