Risk = consequences × likelihood … or does it?
For those of use that like formal methodologies for translating threat models into action, then the NIST framework and presentations are a good place to get lost in. You can apply […]
For those of use that like formal methodologies for translating threat models into action, then the NIST framework and presentations are a good place to get lost in. You can apply […]
Looks like I have new toys to play with on my Raspberry Pi estate…: In its latest release, Ubuntu Core 20, Canonical has gone to great pains to make it […]
The good news is that 5G is software based so can be updated. The bad news is that 5G is software based so is easier to hack…: […] Unlike previous […]
I sat next to a security manager for an academic institution in Latvia last week and asked him what he was doing to protect his network seeing as he had […]
This may set the tone for the next 5 years of tech development in Europe so worth watching…: Margrethe Vestager had a rough patch in court. But Europe is far […]
Using the public internet for mission-critical workloads? Time to make sure plan B is in place…: […] The BGP standard includes so-called Resource Public Key Infrastructure (RPKI) Route Origin Authorisations […]
Interesting profile of this powerful lady. She’s been trying very hard to rein in Big Tech, but with little effect so far…: Call it the paradox of Margrethe Vestager. Europe’s top […]
I have an ancient Wifi setup in my home/office using a mix of kit from Netgear, Apple, Sky, BT…some of it more than 10 years old. This might give me […]
Mayor: Give me the shiny stuff, now CIO: Sure, but I’ll need a gazillion % increase in budget Mayor: … […] “We talk about the bright, shiny objects and […]
If you’re running workloads on (very) old versions of Windows platforms, there’s a little bit of pressure relief in this announcement. Microsoft would very much like you to move to […]