Can You Rely On Your Supplier To Be Transparent?

I’ve been helping a client understand the risk to their business as a result of the Symantec source code’s unauthorised disclosure. As expected we covered the loss of Symantec’s products integrity and the potential impact on the effectiveness of a significant element...

read more

How Far Should Your Risk Assessment Go?

The recent Symantec source code incident brought to mind a challenge which I face in my work day to day. How far do you analyse risk or more importantly the scenarios where risk can be found? Symantec are, understandably, playing down the incident of the compromise of...

read more

Can You Rely On Your Supplier To Be Transparent?

I’ve been helping a client understand the risk to their business as a result of the Symantec source code’s unauthorised disclosure. As expected we covered the loss of Symantec’s products integrity and the potential impact on the effectiveness of a significant element...

read more

How Far Should Your Risk Assessment Go?

The recent Symantec source code incident brought to mind a challenge which I face in my work day to day. How far do you analyse risk or more importantly the scenarios where risk can be found? Symantec are, understandably, playing down the incident of the compromise of...

read more

Welcome

Welcome to one of my internet tenancies. Here you’ll find me musing about risks and opportunities relating to information security, information assurance and IT security management.

Information Security