“Everyone, deep in their hearts, is waiting for the end of the world to come.” – Haruki Murakami, 1Q84
More What is FUD, and why is it so prevalent in cyber security?...
A risk assessment is widely regarded as the foundation for any cyber security programme. It features in government guidance, international standards, and wider good practice.
More What makes a good risk assessment?...
In What do you do when there’s more than one risk? I talked about why, when you want to consider multiple risks together, you can’t just add them together.
More The maths explained series: compound risk calculations to show overall risk profiles...
What do you do when there’s more than one risk? Let’s do a little thought experiment. Imagine that you’re in charge of controlling cyber security risks in your organisation, and that you can only afford to implement one control this quarter.
More What do you do when there’s more than one risk?...
“We don’t need to have our own encryption keys, all of our data is in the cloud.” Cloud services are a useful resource for shifting CapEx (capital expenditure) requirements to OpEx (operational expenditure).
More Even if your data’s in the cloud, its security is still your problem...
They may not be quite like Glen A. Larson depicted them in the 80’s TV series “Knight Rider”, but autonomous vehicles are here.
More Autonomous vehicles and their cyber security...