This is the first in a series of blogs, that will start to look at some […]
We can get insurance for virtually anything these days.  Cars obviously (albeit if that wasn’t law, […]
“He uses statistics as a drunken man uses lampposts – for support rather than for illumination” […]
The concept of ‘Big Data’ is not new and was generally used to discuss the vast […]
A breach.  A data loss incident.  An insider leak.  A media report of client data loss. […]
Security Information and Event Management (or Monitoring) has been a round for a while and was […]
When you think of hacking or start looking at ethical hacking and counter measures, the focus […]
Defence in Depth.  Rings of Security.  Multi-layered protection.  All well known terms when it comes to […]
A firewall.  An aggressive connotation. A wall, made of bricks and cement, literally on fire.  As […]