When it comes to taking the security biscuit for 2015, I believe the recent discovery of a security flaw in FireEYE deserves the award for bringing the matter of Security Complexity to our operational attention. However, I do wish to clarify up front that this is by no means a dig at the product in question. In fact I would congratulate the company for getting a patch out to mitigate the exposure in such a very tight window of just 2 days, so hats off to the FireEYE team [let us hope more learn a lesson from the FireEYE response to a…
Author: Professor John Walker
For month of November, question to our expert panel members is: Which research topic or project in cyber security do you think deserves more funding from Government or other sources and why? and response is below: Given the state of known cyber incursions, security breaches, and large scale attacks manifesting in significant losses to top brand organisation, along with the very real impact on those trusting end-users, one area which I feel deserves investment is Public Security Education and Awareness Campaigns. I would expect such campaigns to accommodate a similar level of security education as would be provided to inter-corporate staff –…
Considering the opinion of Martha Lane Fox who has called upon the UK to lead the way by setting up neutral, independent body to ensure that ‘privacy’, ‘security’ and ‘trust’ are maintained on the internet would seem to be a considerable expectation which, when conjoined represent a very big ask indeed, as when aggregated these objectives may be in conflict.
We are starting to arrive at the conclusion that it is the people who make our organisations insecure – right? It is the people who are those assets who are protected by the firewall, and perimeter defences, yet these very same people-assets are usually the ones who allow some delinquent logical attack to gain the power and ability to circumvent such logical protection!
Professor John Walker comments on a recent security incident in which the Nottinghamshire Police web site was defaced by AnonGhost.
John Walker uses a personal narrative to illustrate how dependent we are on technology, which makes our lives vulnerable to a series of frustrating events.
Services such as Optimise Direct are an important way for us to blend security and cost savings together and thereby create SaaCS.
For the last decade or so, the infosec and cyber security industry seems to have lacked vision when it’s come to anticipating new attack vectors and risks.
Professor John Walker reflects on the risks and benefits associated with our use of the cloud.
John Walker discusses the need for security professionals and MP’s to rise to the challenge of curtailing the spread of child abuse images online.