This article looks at the relevance of frequent password changes
read moreDownfall of Intel Chips
A new vulnerabolity affecting CPUs are discussed in this article
read moreStorm in a teacup - 0508
This articles looks into the recent revelation on Microsoft's Storm0508 attack
read moreTrue C vs False C - Case study on the role CISO - Part 4
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 3
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 2
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 1
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreCISO on crosshair
This article looks into increasing liability of CISO in the industry.
read moreDigital Asset Series: Cyber Risk Management for Trustees
This articles looks into a framework to establish cyber risk management for digital asset trustees
read moreZero Days, Breaches and Reprise
This thought piece is reflected on current affairs
read more