I have discussed your organisation’s information on an employee’s mobile phone as part of my Devices and Cyber Security Primer – and a BYOD policy is something, I find most organisations have. However, I have also found it is also one of the most ignored policies. This is why it …
AI on Octagon’s Blog
Martin and Ben have been the editors for this month’s Octagon Technology Newsletter and being geeks and generally interested in technology, they chose AI as their theme. Here are the AI posts we wrote for their newsletter: Copilot AI and the Phishing Email Careful with that A.I. Eugene ! / …
Because It’s Friday – The Reality of Time Travel
Regular readers will know I like a good sci-fi story and especially a time-travel story. At the moment I am reading the classic Rainbow Mars by Larry Niven and I am part way through the more modern series Chronicles of St Mary’s by Jodi Taylor. However, there are two main …
Continue reading “Because It’s Friday – The Reality of Time Travel”
Realistic Cyber Security
The Wednesday Bit is still on holiday! A couple of weeks back, whilst walking in Scotland, I got involved with a prospective client in a discussion about the benefits of our cyber security stack and in particular our Security Operations Centre. The discussion was not about “how much” but what …
Cloud Computing Cyber Security
Here is an excellent article from The Conversation, by Amro Al-Said Ahmad, looking at the vulnerabilities of cloud computing and infrastructure. How we’re using ‘chaos engineering’ to make cloud computing less vulnerable to cyber attacks (theconversation.com) Your Takeaway Many times, when I am involved with an IT and Cyber Security …
Because It’s Friday – it is all Randall today!
I have a couple of quick things today from the mind of Randall Munroe. An “old” look at the Periodic Table showing how revising was for a chemistry exam was so much easier back in Ancient Greece: xkcd: Classical Periodic Table And one about simple mechanics: xkcd: Ferris Wheels Have …
Continue reading “Because It’s Friday – it is all Randall today!”
Hackers target security software
We all depend on the various technical cyber security solutions we deploy, firewalls, anti-virus, end point detection and response (EDR), there are many names and the threat actors know we depend on them. So it should come as no surprise that there are attacks, that first attempt to disable these …