I have just published the second part of a series of articles looking at the governance that business owners and boards should exercise over software, websites and their reputation:
Because It’s Friday – Is this the Matrix?
Sometimes it is just the title of an article that means it makes the “Because It’s Friday” slot. This one is a classic example: How to test if we’re living in a computer simulation (theconversation.com) Then there is synchronicity that confirms that I am running the right story. This was …
Continue reading “Because It’s Friday – Is this the Matrix?”
Warrantless police access to 250 million devices
This story is from the United States and applies to law enforcement over there – but what happens over there often comes here: Sneaky ways cops could access data to widely prosecute abortions in the US | Ars Technica Our privacy is important so we all need to be aware …
Continue reading “Warrantless police access to 250 million devices”
Stress – the classic social engineering tactic
Threat actors have to find ways of breaking down our cyber security training – that is where social engineering comes in. They want to find some way to get you to do what they want – this usually means exploiting your trust, but a bt of stress in there to …
Continue reading “Stress – the classic social engineering tactic”
