Links for the week of 10 Jan 2022

Links for the week of 10 Jan 2022

January 10, 2022 · 1 min · 12 words · Me

Links for the week of 4 Jan 2022

Links for the week of 04 Jan 2022

January 4, 2022 · 1 min · 43 words · Me

another test

more testing Photo by me. [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses

December 19, 2021 · 1 min · 11 words · Me

hello world

hello world. Photo by me. [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses

December 18, 2021 · 1 min · 11 words · Me

How Encryption Became The Board’s New Best Friend

For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value. How things have changed. In just the past few years (and hundreds of high-profile breaches and £Trillions of economic damage later), cyber threats became impossible for the boardroom to ignore. Beyond simple economics, the crippling effects of a breach on a business are increasingly broad – from information loss and operational implications, through to media pressure, reputational damage and action from customers or regulators. And so, as the nature of business changed and boards were forced to become increasingly accountable, the idea that issues like encryption are “too technical” for the boardroom transitioned from being an acceptable excuse to a legitimate liability. ...

May 7, 2019 · 4 min · 836 words · Me

Brighton Marathon race report

Marathon race summary

April 5, 2018 · 5 min · 1059 words · Me

Super cold Brighton Marathon training

Super cold run yesterday. Maybe it helped though… I’m sure that wearing my prostatecanceruk shirt helped too Photo by me. [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses

March 10, 2018 · 1 min · 26 words · Me

Wetherspoons breach - It's not just about the card numbers

Although it is reported that “very limited” credit and debit card information was accessed in the Wetherspoons breach, it is of no less significant concern that personal details including names and email addresses may have been stolen. In fact, theft of card details is relatively easy to ‘deal with’ – they can be blocked and replaced. It’s the other – seemingly innocuous – information that can pose a bigger problem. ...

December 4, 2015 · 1 min · 212 words · Me

Keys to the "Concrete Jungle" – from skilled locksmiths to skilled cryptographers

We learned a few weeks ago that master keys for every elevator in New York, from skyscrapers to subways to construction sites, had been copied and leaked, and are now being freely sold online. Let’s hope the image used in that article isn’t of the actual key, else we’ll have an even bigger problem on our hands - thanks to a news piece on baggage handling from last year, replica TSA keys (that open every modern suitcase) have now been 3D printed using leaked photographs of the keys. ...

December 2, 2015 · 3 min · 506 words · Me

Financial Services Organizations Need to Adapt their Security Practices to the Shifting Environment

Companies and organizations, whether in the public or in the private sector, are re-establishing their business in the era of information and data revolution. Labelled Industry 4.0, businesses are taking advantage of digital technologies like cloud, mobile, and IoT to digitally transform their operations. Even “traditional banks” seek to drive more revenue from digital products, personalized services and experiences. At the same time, financial services organizations need to adapt to a shifting global environment. The COVID-19 pandemic has urged all enterprises to alter their business and security models to support work-from-home practices. ...

5 min · 973 words · Me