Posted on 22 September 2011 by
As a follow-on to my previous post on how identity can be verified according to your footsteps, I just wanted to highlight how this could be put to effect in catching assassins and other criminals. One of the biggest TV highlights of the year, spy series Spooks (broadcast under the name MI5 for our American […]
Posted on 21 December 2012 by
If you read the news as much as I do, you probably have seen a lot of advice about how to avoid having your financial details stolen this holiday season. It’s true that conducting banking transactions or shopping online does make you vulnerable to cybercriminals lurking in the background. But there are a lot of […]
Posted on 01 March 2012 by
RSA 2012 is the biggest event in the security calendar. I’m here in San Francisco immersing myself in a buzz of activity and discussion about the latest cyber threats, data breaches, risk management and cloud security. But despite all the hustle and bustle I can’t keep away from my favourite blogs and wanted to share […]
Posted on 10 March 2014 by
The news that “123456” has replaced “Password” as the worst password of 2013, (covered here by Ina Fried) could be taken as a positive. After all, “123456” is at least marginally less obvious than “password”. However, it should also act as a wake-up call for those who still believe a mere password is the most […]
Posted on 29 July 2014 by
There are many companies that claim to secure your digital services, networks, servers and even whatever you have hosted in the cloud.
Posted on 25 September 2019 by
When it comes to granting access to confidential data at work who can really be trusted? With a Zero Trust mindset the answer should be no one at all.