Browsing All Posts filed under »Mobile«

Zero-Click, Zero-Alert, Zero-Chance, The Mobile Blind Spot

January 28, 2026

0

Light-headed and sleep-deprived, sitting in Hong Kong (China) en-route to Osaka with three hours to kill, I found myself people-watching rather than sleeping. Around me was a familiar modern tableau, executives clutching the latest smartphones, a few stubborn laptops still in evidence, all of us quietly tethered to our digital lives. A question surfaced that […]

Digital Transformation or Digital Vortex

October 7, 2017

0

You know that the world has changed fundamentally with the digital hyper-connectivity of our now ‘Networked’ society. A change that has and continues to challenge traditional business models, markets and thinking, so you have done the logical thing and commenced the Digital Transformation of your business. So far so good, you think. But there is […]

Apple remains shameless in their wanton ‘Planned Obsolescence’ agenda

July 7, 2017

1

May of those sitting in front of overpriced Apple devices represent a unique audience of the dammed, dammed by their own myopic almost dogmatic passion and pride in a brand. It’s a severe case of Emperors clothes, where Apple once a leader is now a laggard. Apple is now bloated on its own success having […]

Cyber Insurance – Let the dance begin

May 23, 2016

0

No imagination needed, as HM Government and Marsh (leading broker and insurance advisor) report lays out starkly,  ‘UK cyber security: the role of insurance in managing and mitigating the risk’, on the current big thing in Insurance for the London markets, no not lunch! The Cyber Insurance market opportunity and how this could see Lloyds of London as […]

Breaking the Law – 80% of biggest 100 Law firms Hacked

April 5, 2016

0

It was only a matter of time before Legal Practices followed Hospitals and Public Sector organisations to hit the headlines and join the ranks of the great humbled. The frightening thing being that this is not the end of the journey but just a taste of what is still to come across many other professions […]

Gulf Information Security Conference 2016 Insights

April 3, 2016

0

If one lesson has been drummed home from my position as Chairman this year of the Gulf Information Security Exhibition & Conference (GISEC 2016) it is that NO company or individual is alone in their defence against Cyber threats and shared insights. Everyone is impacted. Furthermore, in a trusted environment, the sharing of experience, guidance […]

The Gulf Information Security Conference 2016 – Chairman’s Statements

April 3, 2016

0

The following is a summary of the notes from the opening and closing statements for this year’s GISEC 2016 Conference. For more on the insights from the conference please see the separate report – ‘Gulf Information Security Exhibition & Conference 2016 Insights’. Conference Opening Welcome to GISEC 2016, the Gulf Preeminent Information Security Conference. As […]

Gulf Enterprise Mobility Conference 2016 Insights

April 3, 2016

0

The original intention was to do two full reports from my perspective of Chairman this year for the Gulf Information Security Exhibition & Conference (GISEC 2016) and the Gulf Enterprise Mobility Exhibition & Conference (GEMEC 2016), so it will come as no surprise to anyone active in these spaces to hear that the Enterprise Mobility […]

Microsoft Mobile, is the time nigh?

October 29, 2015

0

Despite continued delays in the roll-out of Window 10 Mobile to existing Windows Mobile devices and Windows Mobile users being treated like second class Microsoft citizens when it comes to apps, Microsoft may be at last onto a winner with the help of their new Window 10 single platform strategy. Well some would say about […]

‘Internet of Things’ (IoT), Convenience or Calamity?

June 3, 2015

5

Fertile ground is the musing of men, and no less so a recent splendid evening exercising thoughts on the Internet of Things (IoT) as the technology wave sweeping across our digital landscape. The inter-networking, connecting and digitisation of everything around us, the automating, remoting, outsourcing and self-managing of things as diverse as: Refrigerators ordering product […]

When the going get’s tough call a Microsoft Partner

April 28, 2015

0

Microsoft often gets a hard time for its security and the confidence customers can have in its product. Recent comments in the press around the benefits of Open Source as a more secure and transparent option misses a critical component in the debate and evaluation criteria – Partnership and Structure. In my experience proprietary software […]

A Modern Moral Dilemma – Government Cyber Friend or Foe?

February 21, 2015

1

Biological warfare has been outlawed by international convention for many years now. More than 100 nations signed the 1972 Biological Weapons Convention treaty and declared germ weaponry “repugnant to the conscience of mankind.” When one door closes another opens, and we are now confronted with a similar dilemma in the handling of Cyber attacks. Overdramatic? […]

Social Media, the Identity Thief’s best Friend

March 3, 2014

0

Are you a squeaky hinge? Do you seep PII (Personal Identifiable Information)? Are you the weakest link? When I do reviews of individual’s online visibility and exposure to Identity Theft or raised profile for physical burglary it is not always the individual themselves who are the cause of their downfall but third parties. A compromised […]

Microsoft OneDrive, What’s in a name?

February 19, 2014

1

‘Microsoft launches OneDrive globally, with some freebies’. More on the freebie ‘Microsoft to give 100GB free OneDrive storage to early birds’. So it’s out with a big fanfare and more obfuscation for the humble consumer and business user alike as they get their heads around a name change and a few new bells and whistles […]

When it comes to PC’s 2013 says it takes two to Tango.

January 5, 2014

0

2013 was a year that resounded with harbingers postulating the demise of tech (the PC being the whipping boy) and the rise of tech (fondle’slabs with Apple iPad leading the charge predictably) as never before in a totally compromised digital ecosystem, the latter point coming as no surprise to those in the security industry and […]