Secure IT

>
 
>
avatar

This was not the planned blog posting for this week – that has disappeared – along with everything else…!

The iPad crashed and had to be restored to a much earlier point....!
avatar
I've just started the OU's Introduction to Cyber Security MOOC which lasts for the next 8 weeks (for about 3 hours a week). The course was supported by UK Government, and is free to access.

Partly this was to keep my skills up to date, partly to ...
avatar
One of the recurrent themes that we hear in our discussions on cyber security with members, industry and government is the need for training. People generally are seen as the greatest risk, and the best way to mitigate that risk is to train them.

...
avatar

Bashed and Shellshocked

by Leo Waldock on 29.09.2014 18:14

Shellshock is a security hole in Bash that puts Linux systems at risk.

No doubt that sentence is as clear as mud so let's unpack it a little.

Bash stands for 'Bourne Again Shell' in honour of Stephen Bourne of Bell Labs and a command...

avatar

I moderated a fascinating session on cyber security in Zurich earlier this week, and it was very interesting to compare notes with the speakers and audience to see how similar the issues are between us. The evening was a joint event between ICAEW an...

avatar

How to waste two hundred million dollars per annum

JPMorgan Chase & Co. is a huge company, as these numbers prove. In 2013 they made $96.6 billion net revenue and raised $2.1 trillion in capital for its clients. Even the costs of such a compa...

avatar
The NAO has today published an update for the Committee of Public Accounts on the Government’s National Cyber Security Programme.

The overall conclusion is that Government continues to make good progress in implementing the Programme. It must, h...
avatar

It comes to something when a chap returns from holiday to find the BBC banging on about nude photos of Jennifer Lawrence. I confess that I knew the name but had to be reminded that Lawrence played the leading role in 'Hunger Games'

Anyway, '...

avatar

Trying to extract data from one program and import into another promises to be easy but is often very time consuming and fraught with problems. In theory it is easy - export as a comma separate value (csv) file and import into a different product....

avatar

I fully accept that Amazon and eBay know a huge amount about me and while I may not like the fact, there is little that can be done.

It is a similar story with the household Nectar card which proves beyond doubt that we prefer baguette to sli...