[this article is based on the draft text published by the European Council on 28th January 2016. Recital and article numbers, at least, will change before the final text]The final version of the Data Protection Regulation's breach ...
With Parliament now on its summer break, the legal position under the Counter-Terrorism and Security Act 2015 is unlikely to change till September. That makes this a good time for HE and FE providers in England, Wales and Scotland (the duty doesn't cover Northern Ireland – see s51(1)) to review the guidance that has been published and plan what they will need to do to...
Following a couple of talks earlier in the FIRST conference that described how economic forces drive security downwards, it was good to hear a final keynote from Bruce Schneier that suggested that economics may actually encourage the development of high-quality incident response services. Incident response is commonly divided into three phases: prevent, detect, respond. Prevent...
Vulnerability handling – how organisations deal with reports of security weaknesses in their software and systems – is a field that has developed a lot in my time working for Janet. When I started most organisations receive...
JiscCommunity has been this blog's home for eight years, but I'm now moving over to JiscInform. That has many nice features, notably that it works really well on...