Visibility Over Weird & Wonderful IoT Must Be Priority

By Chris Hodson July 25, 2017  Following the news that Durham chief constable Mike Barton has called for security ratings on all internet-connected home appliances, Chris Hodson, CISO EMEA at Zscaler commented below. Chris Hodson, CISO EMEA at Zscaler: “When observing the Internet of Things, we tend to look at the weird and wonderful aspects but essentially security …

Continue reading Visibility Over Weird & Wonderful IoT Must Be Priority

RISK Management 101

So, how do we get started?  Where are the risks in our organisation and who is responsible for identifying, managing and remediating risk?  In the following section, we are going to identify the stakeholders and processes for managing risk within an organisation.  I appreciate that stakeholder communities, budgets and risk appetite will vary significantly depending …

Continue reading RISK Management 101

What is ‘Cyberspace’?

We have science fiction author William Gibson to thank for introducing the term ‘cyberspace’.  In his 1982 short story “Burning Chrome”, Gibson introduces ‘cyberspace’ to describe mass hallucinations in cyber networks.   Gibson later included the short story in a collection of works by the same name (Gibson, 1986).  It was a reference to ‘cyberspace' (in …

Continue reading What is ‘Cyberspace’?

Noord CISO Interview: ‘We have 100,000 Internet Gateways: Enterprise security in the cloud-first, mobile world’

[An interview with Noord InfoSec Dialogue upon my return from Blackhat 2017] Despite the meteoric rise of cloud-based applications and services, as well as its subsequent adoption by a significant number of enterprises, security still remains a major concern for many organisations. The biggest misconception of cloud is that it is less secure than on-premise capabilities. …

Continue reading Noord CISO Interview: ‘We have 100,000 Internet Gateways: Enterprise security in the cloud-first, mobile world’