ComputerWeekly were good enough to host my musings on the experience at HutZero. Here’s the link to the fourth blog.
ComputerWeekly were good enough to host my musings on the experience at HutZero.Here’s the link to the third blog.
ComputerWeekly were good enough to host my musings on the experience at HutZero.Here’s the link to the second blog.
ComputerWeekly were good enough to host my musings on the experience at HutZero.Here’s the link to the first blog.
Circadian in 2016 The Quill service allows Enterprises to recognise its own customers and weed out imposters. It seems like quite the leap from our fintech origins, so how did it come about? A review of the big steps of 2016. Ideation The concept slowly came into being as two separate work-streams merged. As keen […]
Isn't it time we began receiving concierge levels of service when entering our favourite data spaces?
A slice of bad luck: one is edible, but which one?So just how well does your service provider look after you(r password and your cybersecurity)? This time, a proportional view. (tl;dr: only one of those slices is good for you.) Sure, you don’t care, you only used that password once (the others won’t, but I […]
Or, have you been hurt?In an earlier post we talked about the level of password protection layered onto your personal data by the service providers (tl;dr: not enough). In this post we’re going to look at how much it hurts those same providers when your data eventually does go missing. Quality Research The Ponemon Institute, […]
We will look into the value of data in a later post, but for now let’s just assume that bad guys want to get hold of the personal data you have entrusted with a service provider. We repeatedly hear about data breaches because the natural end-point of your personal data is on the dark web […]
Brute Force or nimble Mask?You can’t go long in the hacking world until coming across masking. Masking, much like dictionary attacks, makes the infeasible entirely possible. Once again, the clever alignment of computing power with already-known patterns of user behaviour has the power to create a very serious headache for the corporate whose data has […]