Syndicated Blog

Palmer on Cyber
Comment from Matt Palmer on cyber security and resilience
Applying agile principles to public sector change

Applying agile principles to public sector change

Shortly after 2001, I was one of many to sign the agile manifesto for software development. This document went on to start a global movement and change how technology change is done: ...
Challenging password dogma

Challenging password dogma

Most best practice advice on passwords is terrible. But why? This article explains which password advice should be followed and which advice is harmful, and shows you what a good password policy ...
10 steps to effective board leadership on cyber security

10 steps to effective board leadership on cyber security

Boards and non executive directors can lead from the front on cyber security and reduce risk for your organisation. Yet sometimes it is not easy to find a path forward to engage ...
How to win Board support for your cyber security project

When Cyber Security Board Reports Fall Short

Reporting cyber security to the board involves a delicate balance. Cyber security technical details need to be turned into strategic plans that match the organization's risk tolerance and business goals. Here’s how ...
Does moving to the cloud mean compromising on security?

Does moving to the cloud mean compromising on security?

Cloud security means multiple teams with a shared responsibility. The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations ...
How to get fast board buy-in for your cyber security project

How to get fast board buy-in for your cyber security project

To experts, the business case for cyber security change programmes can seem clear as day — it can be hard to understand why rational business leaders may say no to investment. Yet ...
Lessons from the MGM cyber attack

Lessons from the MGM cyber attack

| | Post Incident Reviews
On September 12, 2023, MGM Resorts International experienced a cyber attack that resulted in them shutting down their systems. The investigation is ongoing, but crime groups Scattered Spider and APLHV are believed ...
Project assurance skills and Prince 2 for IT auditors

Project assurance skills and Prince 2 for IT auditors

| | Careers, Projects and Change
The challenge of IT Project AssuranceProject assurance can be a challenge; change programmes are notoriously complicated with many dependent parts contributing to an overall goal. Project managers often have a different view ...

A personal experience of CISSP boot camp

|
Information risk and security is an infinite field of work and study. You can spend your whole life trying to gain the width or depth of knowledge necessary to do the job ...

Should I get CISSP Certified?

| | Careers
The focus of CISSP is purely Information Security. Having said that, its a very big field. CISSP’s reputation as a certification is for being ‘a mile wide and an inch deep’. In ...