Is hacktivism an acceptable choice?
Breaking Down Cybersecurity: The Real Meaning Behind the Jargon
What really is cyber security and why doesn't the traditional CIA triad of confidentiality, integrity, and availability work?
And what's that got to do with footballs anyway?
I've written this simple breakdown of the five key cyber security terms - confidentiality, integrity, availability, authenticity and non-repudiation - with examples of what they mean in practice, and real life incidents illustrating what happens when they go wrong!
Applying agile principles to public sector change
Shortly after 2001, I was one of many to sign the agile manifesto for software development. This document went on to start a global movement and change how technology change is done: from grandiose projects that often failed, to iterative change that often delivered.
But agile principles can be applied in other fields too, perhaps nowhere more so than where people are most impacted: public services.
Why is Jersey introducing a new Cyber Security Law?
under our proposed new Cyber Security Law, Jersey Cyber Security Centre (JCSC) will have no power to fine or penalise bad behaviour. We will have no power to insist, unless through adoption of our recommendations by an existing business or regulator. No power to name and shame those who don't do their bit. No power to investigate, to force compliance, or to require others to act.
We will in fact have one power, and one power only: the power to share information in confidence, and to have information shared in confidence with us.
And we will have one ability: the ability to help.
Here#s how it will work.
Welcome to the never-war
The never-war is no longer about war or peace, but about continuously varying scales of conflict. It extends not just to kinetic action (soldiers and tanks) but also to offensive cyber activity. It does not have a defined start or declared end goals, and it often exists without acknowledgement or with only tacit recognition.