Take a long hard look at your shelfware

Twenty-eight percent of security spending is wasted on shelfware, according to CSO’s news article earlier this year.

Shelfware, in case you don’t have any of your own, and aren’t familiar with the term, is a word coined by the technology industry to refer to something that is purchased but is never put in to production.

Continue Reading


Striking the right chord: Don’t make your users incompetent

There is very rarely progress without some cost. I was reminded of this recently by the news that a new piece of railway line – the Ordsall Chord – will cut off the world’s first passenger railway station, Manchester Liverpool Road, from the main line and affect 30 other “heritage assets”.

While changes to user’s experience of software products is rarely as substantial or irreversible as this, the same concept applies: even improvements have a cost. And that cost is, very often, to your current users.

Continue Reading


Boards fall short on cyber security and technological knowledge

In light of the recent data breach at TalkTalk I started to think about why breaches are becoming so common and why there appears to be such a gap between corporate priorities and cyber security. Then something dawned on me, I spend a lot of time speaking with members of the C-suite and articulating the benefits of key security foundations and defense in depth. At lot of the time the members of the C-suite lack the requisite skills to really grasp the importance of cyber security. Through no fault of their own, they do not come from technology backgrounds, but from sales, finance and marketing. In addition, many corporates have not appointed a Chief Security Offer.

Continue Reading


Let the bird fly

Learnings from the keynote at Gartner’s Security & Risk Management Summit, Washington

Every business is becoming a digital business. By 2017, 50% of IT spend will fall outside of the IT department’s control. So what does this mean for organizational security?

The first temptation is to take back control and lock everything down. But that would be the wrong thing to do, and here’s why.

Continue Reading


Will you COPE beyond BYOD?

Since 2010, BYOD (Bring Your Own Device), where employees use their own smartphones, laptops and tablets in the workplace, has revolutionized both how and where we work.

Continue Reading