Password Authentication

Password authentication has long been the regular method to authenticate users on a system.  However, cracking passwords is also a […]

Continue reading

Investigatory Powers Bill

The training I have delivered over the years includes the general principles of security related legislation, such as the Computer Misuse […]

Continue reading

TalkTalk Hack – What Price Security?

The TalkTalk hack was the big security story on the BBC and other news sources in the past week. The […]

Continue reading

User Error

User error is arguably one of the most common insider human security threats in any organisation. The insider threat to […]

Continue reading

An Acceptable Use Policy Helps Avoid Reputation Damage

Schadenfreude ˈʃɑːd(ə)nˌfrɔɪdə,German ˈʃɑːdənˌfrɔydə/ - Pleasure derived from others' misfortune.No one could have missed the news reports of the so called […]

Continue reading