Breaking Down Cybersecurity: The Real Meaning Behind the Jargon

Breaking Down Cybersecurity: The Real Meaning Behind the Jargon

What really is cyber security and why doesn't the traditional CIA triad of confidentiality, integrity, and availability work?

And what's that got to do with footballs anyway?

I've written this simple breakdown of the five key cyber security terms - confidentiality, integrity, availability, authenticity and non-repudiation - with examples of what they mean in practice, and real life incidents illustrating what happens when they go wrong!

Read More
Applying agile principles to public sector change

Applying agile principles to public sector change

Shortly after 2001, I was one of many to sign the agile manifesto for software development. This document went on to start a global movement and change how technology change is done: from grandiose projects that often failed, to iterative change that often delivered.

But agile principles can be applied in other fields too, perhaps nowhere more so than where people are most impacted: public services.

Read More
Why is Jersey introducing a new Cyber Security Law?

Why is Jersey introducing a new Cyber Security Law?

under our proposed new Cyber Security Law, Jersey Cyber Security Centre (JCSC) will have no power to fine or penalise bad behaviour. We will have no power to insist, unless through adoption of our recommendations by an existing business or regulator. No power to name and shame those who don't do their bit. No power to investigate, to force compliance, or to require others to act.

We will in fact have one power, and one power only: the power to share information in confidence, and to have information shared in confidence with us.

And we will have one ability: the ability to help.

Here#s how it will work.

Read More
Welcome to the never-war

Welcome to the never-war

The never-war is no longer about war or peace, but about continuously varying scales of conflict. It extends not just to kinetic action (soldiers and tanks) but also to offensive cyber activity. It does not have a defined start or declared end goals, and it often exists without acknowledgement or with only tacit recognition.

Read More