Monthly Archives: December 2016

17 views

Just a tip: 2017 will be all about Augmented Reality. Maybe not VR, or is that a mere intermediate-phase subset. But AR. When M$ adds some capabilities to WW10 (the platform, or binary),the ground swell (or is it an undercurrent, … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , | Leave a comment

Cyberprevention

Just a signal, of a new movement. Which isn’t. For one, the -prevention — doomed from the [ word Go | – part ]. Which becomes less and less valid. Yes, some deterrent actions may help, but one better focus … Continue reading

Posted in Books by Quote, ERM, GRC, Information Security, Sociological, psychological notes | Tagged , , , , , , , , | Leave a comment

Oops, there it is! (now you don’t, see it)

Suddenly, there it is, almost as if it’s something new … Malware using stego, as if it might still surprise anyone whereas of course there already was this, and this, and this and this. What next? Even smarter ad blockers … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy | Tagged , , , , , , , , , , , | Leave a comment

Golden Oldie Pic of the Day: Interesting read

Yep, again, on how to make things interesting to read …?

Posted in ERM, GRC, Information Risk Management, Information Security, Sociological, psychological notes | Tagged , , | Leave a comment

Particular culture’s greetings

Yep, that golden oldie once again, to all of you:

Posted in Books by Quote, Information Risk Management, Sociological, psychological notes | Tagged , | Leave a comment

The CyberDarwins

As we’re nearing the end of the year (Western calendar, others not spoiling the party — learning point), we draw towards the ‘people being stupid with fireworks’ scenes that are oh so similar to ‘people managing systems’ situation. The former, … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Sociological, psychological notes | Tagged , , , , , , , | Leave a comment

No C3PO, just PO

Section 4, article 37, 1(b) of the General Data (sic) Protection Regulation ‘of 2018’ (sic): When the core activities of the controller or the processor consist of processing operations which, by virtue of their nature, their scope and/or their purposes, … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Privacy, Sociological, psychological notes | Tagged , , , , , | Leave a comment