by Colin Robbins | Feb 11, 2021
Using Maths to Show that Automated Security Tools do not Provide Security Automated security tools can be a very effective security tool, but there are pitfalls for the unwary. I will use a couple of well-known maths puzzles to illustrate why these pitfalls exist. 1 =...
by Colin Robbins | Jan 20, 2021
The Risks of Cyber Cat Flaps So here we are in January 2021, and the significant hacks are already being reported, picking up where 2020 left off. While the cyber industry is still managing the fallout of SolarWinds, Google has announced (with few details of the...
by Colin Robbins | Jan 13, 2021
What is High Assurance? As computer security systems have evolved over the years, hackers have become more sophisticated. Their methods have changed, targeting any vulnerabilities to try and find a way into a system. No business is immune from cyber attacks,...
by Colin Robbins | Jan 6, 2021
The King is Dead, Long Live the King! For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber...
by Colin Robbins | Dec 8, 2020
What does a CISO at an SME do during their working day? A CISO – Chief Information Security Officer – at an SME is responsible for security operations, securing the business, its technology, and its initiatives, and leading the business’s information security...