Our Blog

To Cloud or Not to Cloud?

By Mobolaji Moyosore | Dec 7, 2017

“Old age is like a plane flying through a storm. Once you’re aboard there’s nothing you can do.” – Golda Meir Let’s set the context to begin with: the “cloud” is your infrastructure and data in someone else’s data center. Most components of this infrastructure have IP addresses and so are hackable. Worse still, your data

View Full Post
Read More

The Cyber Security Talent Gap – Myth or Reality?

By Mobolaji Moyosore | Dec 5, 2017

Mind the gap. If you’ve ever travelled on the London underground, you will be familiar with the line: “Please mind the gap between the train and the platform. Mind the gap”. This audible phrase reminds (or warns) passengers to be mindful of the spatial gap between the station platform and the train door. The first

View Full Post
Read More

Security Technology Products, Inflection Points, and Enterprise Defenders

By Mobolaji Moyosore | Feb 10, 2017

Vendor: You do need this too! Practitioner: Really? Ok, I’ll have that (tool) too. Cyber security professionals have a unique reputation for being the “No, you can’t” department within an enterprise environment. The end user asks if they can do something, security says “No, you can’t”. Of course, next time they’re unlikely to come back

View Full Post
Read More

Travails of the Information Security Practitioner

By Mobolaji Moyosore | Nov 25, 2015

As a security practitioner, if you have, at some point in your career, had to answer the question: “why should security always impose difficulty on legitimate business users?”, you’re not alone. A lot of business users struggle to see the values that security adds to the business. It’s neither their fault not their responsibility to figure it

View Full Post
Read More
×

Make an appointment and we’ll contact you.