Archive | Identity and Access Management RSS feed for this section

Out of Office Dilemma

13 Dec

As we approach the Christmas holiday period, I thought I’d share a cautionary tale on setting up your Out-of-Office auto-response. For quite a while now I have been building a relationship with a prospective customer. While I have had discussions with a person there – let’s call him Bob –  Bob has worked hard to keep his privacy. Continue reading

Payment Services Directive

29 Nov

So, Tesco was hacked. Although there is no official word yet on how this happened, the chatter among people far smarter than me are suggesting the issue is related to passwords and the Tesco Club card.

Followers of CyberMatters will recognise that I often blog about password issues. Is there anything new to say on the subject I hear you ask? Yes…  Continue reading

We cannot let passwords die (yet)

4 Aug

I’m getting fed up with marketing that says “Passwords must die” only to present yet another solution that won’t replace them. 

The challenge to solve is ubiquity – this is why passwords have stood the test of time, even with their obvious and proven shortcomings.

Continue reading

Considerations when Managing IoT Device Keys

15 Mar

As we rapidly advance to the new world of the Internet of Things, security is slowly but surely starting to be talked about. Managing keys is an important part of this discussion.

Continue reading

How do you dispose of your Smart Home?

23 Feb

A few weeks back, I worked with the SH&BA to publish guidance on the Security of your Smart Home.

Shortly before we went to print I sold my car, and suddenly realised there was a big gap in the document.

Continue reading

The Insider Threat

5 Jan

According to the latest UK Cyber Breaches statistics, three-quarters of large organisations suffered a staff-related breach and nearly one-third of small organisations had a similar occurrence within the last year. Continue reading

Cyber Matters Top 10 posts from 2015

22 Dec

As 2016 approaches, I thought it would be nice to look back on 2015 and share with you the Top 10 most viewed blog posts here on Cyber Matters. Let the countdown begin … Continue reading

Phishing Nets

1 Dec

Phishing is one of the most common forms of cyber-attack at the current time.  Effectively attackers try and fool you to providing sensitive data such as user names and password into fake web sites. Continue reading

The Smart Home Cyber Security Manifesto

24 Nov

At the Smart Homes and Building Association (SH&BA) “Smart Home Breakthrough Summit” last week, a new Cyber Security Manifesto was unveiled by CONTEXT, a leading European IT market analysis company, and the SH&BA Security Panel. Continue reading

Cars Need a Root of Trust

20 Oct

Fiat Chrysler has suffered a widely publicised attack where hackers remotely killed a Jeep. The resolution has been to send a USB stick in the post to owners, for which they have been criticised. The criticism is in two parts.

Continue reading