Tag Archives: Information security

From bike design to security design

You recall my posts from a couple of days ago (various), and here, and have studied the underlying Dutch Granny Bike Theory (as here), while not being put off by the lack (?) of design when taking a concrete view … Continue reading

Posted in Books by Quote, ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Sociological, psychological notes | Tagged , , , , , , , , , , , , | Leave a comment

4Q for quality assurance

To go beyond the usual, downtrodden ‘quality in assurance’ epitome of dullness, herewith something worth considering. Which is about the assessment of controls, to establish their quality (‘qualifications’) on four, subsequent, characteristics [taking some liberties, and applying interpretation and stretching]: … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , , , , , , , , , | Leave a comment

One extra for Two AI tipping point(er)s

To add, to the post below of a month ago. This here piece, on how AI software is now writing (better) AI software. Still in its infancy, but if you recall the Singularity praise (terroristic future), you see how fast … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy | Tagged , , , , , , , , , , , , , , , | Leave a comment

You Don’t Call The Shots

I.E., You Are Not In Control ! This, as a consequence of the ‘In Control’ definition. Where the controlling and ‘steering’ (what Steering Committees are about, if properly functioning … 😐 ) are the same. But as explained previously, such … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Sociological, psychological notes | Tagged , , , , , , , , , , , , , , | Leave a comment

The ransom monster

Now that the ‘No way josé’ solutions against ransomware [regular back-ups, virtualisation of servers, and tight intrusion controls et al.] have become so widely known, and ransomware having evolved to be more of the APT kind (incubating for up to … Continue reading

Posted in ERM, GRC, Frank Lloyd Wright, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , , , , , , | Leave a comment

Two stikes and you’re out of third party standards

What a wobbling title. When already for a second time (here), the European Supreme Court has ruled that laws requiring broad (meta)data retention for trawling are illegal per se, with a minute few exceptions, making it illegal to consider it … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy, Sociological, psychological notes | Tagged , , , , , , , , , , | Leave a comment

A parachute to your Dutch granny budget

If you have no clue about the title, read on. It’s about a Dutch ‘granny bike’. And about your bosses’ golden parachutes. And how to get budget for the playthings bare minimum tools you require. First off: the biker part. … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Sociological, psychological notes | Tagged , , , , , , , , , , , | 2 Comments