Posts

Brexit and Cybersecurity

Introduction

Regardless of whether Brexit does happen, is delayed or cancelled it has and will affect the UK's relationship with other countries and one of the areas affected will be cybersecurity. This post will aim to briefly highlight what affects Brexit will have on cybersecurity in the UK and what things will change or stay the same regarding cybersecurity. Due to the nature surrounding Brexit at the moment, a few things are an unknown at the moment until Brexit has come to pass.
Possible Effects of Brexit disruption
Brexit may disrupt cybersecurity in the UK and between businesses and the EU , to what extent is unknown until Brexit happens. With a key unknown being what will happen to information sharing regarding threats, vulnerabilities, cyberattacks and how the transfer of digital information across borders will be handled. 
But on the other hand, Brexit might not change much in the short term regarding cybersecurity. Rather than being a stumbling block, Brexit could help rai…

Due Diligence in Cybersecurity

Introduction
Due diligence can be defined as an action that is considered reasonable for people or businesses to be expected to take to keep themselves or others and their assets safe from harm. Due diligence is often associated with legal matters and corporate acquisitions. As cybersecurity moves slowly beyond being technology and encryption focused to include other specialists making use of due diligence to aid in protecting company assets and to mitigate risks is vital. So what is cybersecurity due diligence? The term has been defined as “the review of the governance, processes and controls that are used to secure information assets.” Such due diligence obligations may exist between states, between non-state actors (e.g., private corporations), and between state and non-state actors. This blog will examine the issues surrounding due diligence in cybersecurity and why they are vital to preventing or mitigating cyber attacks.
Why should we worry about Due Diligence?
The various regu…

Applying lessons from NASA to Cybersecurity

Introduction

The subject of this applying lessons from NASA to cybersecurity might seem like an odd choice but there are a few reasons I chose this route. Firstly, why use NASA and not some other science and engineering organisation? I have always admired and enjoyed reading and learning about the work of NASA with particular topics being the now-retired Space Shuttle Programme, the still going Voyager  satellites and NASA's research into Astrobiology. (an interdisciplinary scientific field concerned with the origins, early evolution, distribution, and future of life in the universe). Also, by using an area of work in this related to NASA can provide a different take on problems we are trying to solve. By looking at seemingly, unrelated areas we can find new ideas or ways of thinking about a problem. Over the past ten years, NASA through their website has released various ebooks for free covering various topics including history, aeronautics science etc. This blog post will use some…

Though and Opinions from London Computer Conferences 2019

Introduction

Computing Conference (formerly called Science and Information (SAI) Conference) is a research conference held in London, the UK since 2013. The conference series has featured keynote talks, special sessions, poster presentation, tutorials, workshops, and contributed papers each year. This year the event happened on the 16th to 17th July. This blog post will aim to show some of the ideas and research that was presented and how they might apply to the standards work that I observed.

Day 1

Keynote Talks
The first keynote talk was about the rise of accelerators in computing. The requirement for specialist chips because general-purpose chip designs have plateaued or are at there limit when it comes to speed increases and die shrinkage. There is now a move for greater energy efficiency in chip designs are becoming more important. Part of this solution is decreased memory/data latency when fetching that information and processing it. Already, for key applications, greater use of p…

The Provenance of Products and Services in relation to Cybersecurity

Introduction

The networks and eco-system that cybersecurity resides have become increasingly complex as we identify threats and attack vectors. As businesses access their networks, systems and supply chains they may realise that attack surface which cybersecurity has to defend can be very large. Therefore, understanding the provenance of products and services that make up their networks, systems and supply chain is vital to bringing the size of the potential attack surface. Provenance can be defined as the source or origin of an item, idea or a person. The supply chain can be defined as the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end-user. The supply chain segment involved with getting the finished product from the manufacturer to the consumer is known as the distribution channel…

Personal Interest - Japan and UK Cultural relations

Introduction

This blog post is about the Japan-UK season of culture 2019/20. The “Japan-UK Season of Culture” is unfolding in 2019 and 2020, when Japan hosts two sporting landmarks: the Rugby World Cup in 2019 and the Tokyo Olympic and Paralympic Games in 2020.  It seeks to build on the British people’s keen interest in these events by showcasing Japan’s multifaceted attractions.  They hope that people all over Britain will join with Japan in embracing this chance to deepen mutual understanding, thus helping to create an enduring legacy. I enjoy anime films and tv series, along with I regularly listen to BBC radio. I often listen to drama and comedy programmes. I thought it would be different to speculate about which BBC radio dramas could work as anime. I aim include links to where to listen to these programmes legally if you they peak any interest (note no affiliation if links are to sites that require you too but them). I will include how these dramas would fit into typical anime g…