Quantcast
Channel: Information Assurance – Once Upon a Camayoc
Browsing all 95 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Challenges with unique passwords

It is very important to have different passwords for each different system you have (to make sure that if a password is compromised, only one system will be affected). How many of us can honestly say...

View Article



Image may be NSFW.
Clik here to view.

Does Cyber Hype offer Hope

In the last few weeks we have seen another round of cyber security hype: Flame virus running rampant LinkedIn passwords broken Crypto broken RSA tokens broken in 15 minutes Does this help the cause,...

View Article

Image may be NSFW.
Clik here to view.

Why has encrypted email not taken off?

Recently a colleagues tweet took me to a news article promoting the use of secure (encrypted) email. The article was promoting this as a sensible thing to do, and provided a check list of how to do it....

View Article

Image may be NSFW.
Clik here to view.

How a strong BYOD password can make identity theft easier

I regularly take a train journey into London, it takes about an hour an a half. During this time I learn a great deal from reading, not books, but the laptop of the person sitting next to me. This is …...

View Article

Image may be NSFW.
Clik here to view.

Whose Role is Security?

At a recent Industry event discussing security, a question was rasised as to who needs to take ownership of security issues, the comment was made that it needs to be “someone senior enough to care, but...

View Article


Image may be NSFW.
Clik here to view.

Hotel room zero-factor authentication

A few nights ago I stayed in a Hotel in London. On returning to the room after dinner, my room key card did not work. This has occurred a few times recently, I need to learn that putting the magnetic …...

View Article

Image may be NSFW.
Clik here to view.

Smart Homes / Meters: Consumer Progress or Nightmare

The futuristic visions promoted by Smart Metering and Smart Cities are compelling on several levels. Add into the mix an Internet connected car. As a security person it worries be how this all joins up...

View Article

Image may be NSFW.
Clik here to view.

1999 Conference – Risks of electronic attack on Britain’s Critical National...

In 1999, In Britain, Margaret Beckett, then leader of the Commons, hosted a closed conference for industrialists and intelligence officials to warn about the growing risk of electronic attack on...

View Article


Image may be NSFW.
Clik here to view.

Ethernet over Power

In my blog about smart meters I asked who is looking after the consumers interest in smart meters. Ethernet over Power adds a new dimension to the debate. I received many private comments on the smart...

View Article


Image may be NSFW.
Clik here to view.

Sofa Data Protection No So Good

Just purchased a new sofa – how can that cause a data protection failure? Well I agreed the details of the purchase with the sales person, and he started to enter my details into his computer screen....

View Article

Image may be NSFW.
Clik here to view.

DM Twitter Phishing

Twitter users, watch out for Direct Messages suggesting you look at a picture of yourself… In the last week, I have had 3 twitter DMs attempting to phish. Two suggested Hey, check out this picture of...

View Article

Image may be NSFW.
Clik here to view.

Revelations of a Password Reset

I recently had to reset my password on a Internet service I use. As usual, the process asked me for my email address, and said it would duly send me an email with reset instructions. No problem there....

View Article

Image may be NSFW.
Clik here to view.

Evolution of Common Criteria

Nexor have received Common Criteria certification for our Sentinel Product, as required by our customers. Common Criteria is a scheme that is both much criticised and undergoing evolution. A positive...

View Article


Image may be NSFW.
Clik here to view.

PDF Security: protection from zero-day content-based malware attacks

Nexor have just released a press statement about a new approach to protecting against PDF viruses and file based malware that has been incorporated into Nexor Merlin. In the press release I am quoted...

View Article

Image may be NSFW.
Clik here to view.

Logging on is becoming too hard to do securely

Unique passwords, unique user names, lie about your personal information, secure your recovery email, two factor authentication, OAuth caching. ARRGGGHHH, all I want to do is log on. I can remember the...

View Article


Image may be NSFW.
Clik here to view.

I only went to the Doctors…

I went to the Doctors recently. Didn’t expect to come across a security issue during my consultation, but… I entered the consulting room, sat down, and we started to chat and the phone went. The Dr...

View Article

Image may be NSFW.
Clik here to view.

Do you deploy 2 percent of your staff on Network Security?

In the blog article “Why don’t organisations adopt cyber security measures?” the Tony Dyhouse observes A key finding in the report refers to the current practice of lumping together any company with...

View Article


Image may be NSFW.
Clik here to view.

Guest Blog: Are you in charge of your car’s computer?

While indulging my interest the new Audi R8 (completely speculatively of course I wish I could own one!) I was distracted and amazed by the mass of electronic systems involved in a car of that range....

View Article

Image may be NSFW.
Clik here to view.

Observations on the Forrester Report — Strategy Deep Dive: Define Your Data

The Forrester report  Strategy Deep Dive: Define Your Data (free download, registration required) has an in-depth look at the topic of data classification and defines a framework for data protection,...

View Article

Image may be NSFW.
Clik here to view.

Your Password is Obsolete

Following on from my blog article Logging on is becoming too hard to do securely here is a good info graphic about the state of passwords:

View Article
Browsing all 95 articles
Browse latest View live




Latest Images