themyopsSetting security strategy and the three immutable laws of infosecOur mind likes, I think, to remember things in threes. So when I have to explain the problems of cyber security to a novice audience, at…Feb 9, 2018Feb 9, 2018
themyopsThe bankification of tech and the role of infosecWith the time for ‘2018 predictions’ nearly over (and the list thankfully short this year) I think it is useful to look at some more…Feb 3, 20181Feb 3, 20181
themyopsDid the Macron campaign run a fake identity inside their own organisation?Something rattles about the story that the Macron campaign ‘outsmarted’ the hackers in the French presentials elections just by dumping…May 9, 2017May 9, 2017
themyopsExtend your ITIL: The six essential security servicesSecurity operations done well revolves around six different security services. In this article I will describe these services and why they…Jan 25, 2017Jan 25, 2017
themyopsThe naming of threats: from ‘cyber’ to ‘info’ and back againIn cyber security, we seem to have gone from ‘cyber’ in the early nineties to ‘information security’ and now slowly back to ‘cyber’…Jan 23, 2017Jan 23, 2017
themyopsITIL: No security to speak ofWhy reliance on ITIL is dangerous to your security operations, and will leave you vulnerable [*]Jan 23, 2017Jan 23, 2017
themyopsThe new new security leaderWhat is security leadership? I think this is a critical question now that cybersecurity is becoming a boardroom issue. It is also a largely…Jan 23, 2017Jan 23, 2017