We still have a long way to go with BYOD, and there is a massive hill with regards to educating the public about using unsecured WiFi environments.
Author: Professor John Walker
John Walker comments on common user behavior with respect to mobile devices and suggests that these tools deserve more respect and security awareness.
Professor John Walker weighs in on what makes up a positive security culture and how it can be implemented successfully.
Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.
Professor John Walker gives his reasoning for why he sees Richard Clarke as one of the most influential people in the infosec field over the past decade.
Willie Sutton responded when asked why he robbed banks, his simple and eloquent answer was ‘Because that’s where the money is’.
It is looking like the new Bahrain CyberCrime law is going to set the demographic bar for those Hackers and Hacktivists who are found to be culpable
One upon a time electronic tracking person [target] was expensive, and difficult to achieve, but with the advancement of technology
“We do not see the computer virus as something we should take seriously” – The CESG signal commented that the computer virus was only a passing nuisance!
When it comes to Cyber Security, during Waking Shark II, there were what seem to be issues with a lack of investment