Call us on 03450 21 21 51

SRM Solutions
Virtual CISO: too good to be true?
The SRM Blog

VirtualCISO

Filter by category
Virtual CISO: too good to be true?

Virtual CISO: too good to be true?

There are some things in life that are simply too good to be true: miracle diets, offers of millions from Nigerian princes and free lunches to name but a..

The GDPR compliance fallacy

The GDPR compliance fallacy

There is a curious irony that the enactment of the General Data Protection Regulation (GDPR), drawn up to protect the rights of individuals and their right to online privacy,..

The A to E of cyber maturity

The A to E of cyber maturity

In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading..

Cyber resilience: it’s a board level issue

Cyber resilience: it’s a board level issue

The problem with cyber resilience is in the name. When it comes to managing the risk posed by potential hackers and the requirement for robust testing and defence protocols,..

GDPR: 10 key issues facing UK higher education

GDPR: 10 key issues facing UK higher education

The world of higher education is about to be turned on its head. This is due to the imminent enactment of the General Data Protection Regulation (GDPR) which will..

GDPR: 10 key issues facing UK retailers

GDPR: 10 key issues facing UK retailers

The law regarding personal data will change on 25th May 2018 when the EU General Data Protection Regulation (GDPR) comes into effect. Replacing the UK Data Protection Act 1998,..

Coinhive attacks and how to prepare for the (almost) inevitable

Coinhive attacks and how to prepare for the (almost) inevitable

This week’s report that more than 5,000 websites, including that of the Information Commissioner’s Office (ICO) have been hacked, shows that it really can happen to anyone. Other affected..

GDPR: the world will not stand still on 25th May 2018

GDPR: the world will not stand still on 25th May 2018

The 25th May 2018 is not an end date. Far from it. It marks the beginning of a new era in data protection but one that will continue to..

GDPR: a question of confidence

GDPR: a question of confidence

In a recent interview with SC Media, Amazon Web Services (AWS) Chief Information Security Officer (CISO) Stephen Schmidt explains how his organisation is set up for full General Data..

What is the password?

What is the password?

By Gerard Thompson, Information Security Consultant With over 3,500 MPs, lords and staff, being a computer security administrator in the Houses of Parliament must be a stressful job. They..

UK research highlights the lack of Chief Data Officers at C-suite level

UK research highlights the lack of Chief Data Officers at C-suite level

Research by the data science and marketing services company Profusion has revealed that UK businesses are falling behind their European counterparts. The report highlights the lack of Chief Data..

eDisclosure: the issues facing law firms and solicitors

eDisclosure: the issues facing law firms and solicitors

by Alan Batey Information Security Consultant and Forensic Investigator In today’s world, evidence in legal cases is sourced from the vast quantities of Electronically Stored Information (ESI) that exists..

University CISOs face tough challenges in the next academic year

University CISOs face tough challenges in the next academic year

University Chief Information Security Officers (CISOs) have had a tough time lately. According to information acquired under the Freedom of Information Act by The Times newspaper, some of the..

Prevention and cure: working out an information security budget

Prevention and cure: working out an information security budget

The Chancellor recently announced a £425 million government investment in the NHS over the next three years. While pundits speculate on what this will actually mean for our vital..

Who’d want to be a University CISO?

Who’d want to be a University CISO?

Spare a thought for the University CISO: ‘As a group, CISOs live on a knife’s edge and do not sleep very well. They know that a breach is inevitable.’..

The uncertainty of Brexit, the certainty of GDPR and the responsibilities of the CISO

The uncertainty of Brexit, the certainty of GDPR and the responsibilities of the CISO

As Britain navigates its way through the choppy waters of Brexit, there is a great deal of uncertainty about exactly what form our new relationship with Europe will take...

The technology gap which leaves organisations vulnerable to attack

The technology gap which leaves organisations vulnerable to attack

While all of us are aware of the need to protect our organisation’s technology from potential threats and security breaches, few are fully aware of the gaps that exist..

If Brexit means Brexit, what does GDPR mean?

If Brexit means Brexit, what does GDPR mean?

Politicians do tend to favour soundbites and Theresa May is no exception. So when she said that “Brexit means Brexit” some nodded their heads as if this simple statement..

How a CISO can exert influence at board level

How a CISO can exert influence at board level

Mike Tyson once said, “Everyone has a plan until they get punched in the mouth.” As he is perhaps best remembered for his infamous ear-biting antics, he is unlikely..

The buck stops here: advice for the new CISO on campus

The buck stops here: advice for the new CISO on campus

As Universities return for the beginning of a new academic year, never has the role of Chief Information Security Officers (CISO) been more important. Some will be continuing an..

VirtualCISO: the philosophy of product development

VirtualCISO: the philosophy of product development

The Dalai Lama said: ‘When you talk, you are only repeating what you already know. But if you listen, you may learn something new’. It is, of course, doubtful..

Cyber Security Accountability Does Pay

Cyber Security Accountability Does Pay

Cybercrime in 2015 was nothing short of epic. No one could have anticipated headline news stories such as Sony Pictures Entertainment hacked by a group allegedly sponsored by North..