Posts categorized: Guest Blog

5 December 2017 / Guest Blog / Rupert Brown

Part 3 of this series considers two angles on the issue of Controllers and Processors Firstly firms need to consider the tricky technical subject of Identities and Roles. It is imperative that the path from the foundational identity management systems… Read more »

Read More

21 November 2017 / Guest Blog / Rupert Brown

Welcome to the second of my commentaries on GDPR which looks at the challenges and opportunities of “engineering” a robust and sustainable solution to its broad operational sphere of influence Paragraph 2 of the GDPR regulation provides the top level s… Read more »

Read More

7 November 2017 / Guest Blog / Rupert Brown

Welcome to a series of articles I shall be posting to cover some the key facets of GDPR and how they might be addressed using engineering techniques rather that rather the more simplistic approaches of hoped for policy declarations and attestation that… Read more »

Read More

1 June 2017 / Guest Blog / Vincent Viers

It only takes a healthy dose of paranoia to understand that our privacy is under constant attack. It’s no secret that our personal data is routinely being monitored by the likes of Facebook or the Government. And your refrigerator might just be about t… Read more »

Read More

4 August 2016 / Guest Blog / Maxime du Teil

Organisations are now evolving in an economic and competitive environment to which they seem to have a hard time adapting to in the face of markets globalization, increased competition and diminished growth. As the equation for success is becoming more… Read more »

Read More

7 April 2016 / Guest Blog / Kevin Palop

The Era of Digital Use Cases During the Eighties, technology moved forward considerably. However, as is the case at each technological break point, far reaching evolutions remained un-exploitable for a long time: They were elitist, expensive and didn’t… Read more »

Read More

24 March 2016 / Guest Blog / Rick Warley

The proposed guidance from the FCA for firms outsourcing to the Cloud is a ray of sunshine in a regulatory environment that is usually cast with the gloom of extra work and additional costs. Nowadays, with financial institutions relying heavily on tech… Read more »

Read More

18 February 2016 / Guest Blog / Charles D'Aumale

Why French? France has worldwide leaders in civil engineering, luxury goods, aerospace, and nuclear industry for civil and military applications. But when it comes to cyber security editors and public safety technologies, there is usually a tendency to… Read more »

Read More

8 October 2015 / Guest Blog / Rick Warley

We are all faced with risks every day; with decisions that can have potentially catastrophic consequences. Assessing risk is something we have been coached to do on a daily basis from a young age: Is this wall too high to jump off? Can I cross the road… Read more »

Read More

1 September 2015 / Guest Blog / François Gratiolet

Handling an information security (InfoSec) budget is not an easy task. Most InfoSec departments operate under very tight budget constraints. The challenge is to find the right balance between overspending and underspending. Budgeting for InfoSec is a h… Read more »

Read More