Browsing All Posts published on »November, 2015«

Are Corporates complicit in User Security Breaches?

November 27, 2015


Organizations have for some time used conditions of employment as an end user control in their GRC (Governance, Risk and Compliance) process to address Cyber and Data Security. For many, this is a ‘get out of jail free’ card for disowning the actions of users who may click on the wrong email, inadvertently send documents […]

The User Monitoring Minefield

November 16, 2015


Continuous User monitoring is a reality and an almost essential component of any organizations IT Security toolbox. To preserve employee privacy and the avoidance of challenges from individuals that corporates have compromised their integrity, it requires double blind protections. Obvious yes, but apparently not as many solutions do not flfill this crucial function. With the […]

Caveat Emptor Internet of Things (IoT)

November 6, 2015


Further on the IoT (Internet of Things) theme I first wrote about back in June – ‘Internet of Things’ (IoT), Convenience or Calamity?’ ‘FBI Issues Alert on the Security of Internet of Things (IoT) Devices’. Welcomed news until you move past the headline. The guidance that unfolds recommends that responsibility for security should rest with […]