Analysing global revenue opportunities for cyber security companies.


Synergy Six Insights

SIX DEGREES of INFORMATION

The Six Degrees of Information provides longer reading insights.
by Kevin Bailey 7 October 2024
How many vendors do you see and hear proclaiming to deliver ransomware protection, only to unveil that their solution comes with caveats.
by Kevin Bailey 29 February 2024
Read my review of Commvault's recent London SHIFT event.
by Kevin Bailey 30 January 2024
How can you recover from three copies of data when two may have been compromised and recovery may cost you $100,000's of unbudgeted spend to meet your RTO.
by Kevin Bailey 1 November 2023
But what new knowledge will be shared off the ride in 2023
by Kevin Bailey 14 December 2022
The principles of decentralising one's information into their own ownership are completely related to, and contextualised by, privilege.
HP Wolf Security finds Patching is too slow to react. Replace IDS with NDR
by Kevin Bailey 14 October 2021
HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch. It's time to consider NDR that is fast to deploy, detect and [automatically] respond, before the malware can hit the endpoint. IDS and IPS just don't cut it anymore,
zero trust is being exploited and not aligned to the NIST, NCSC and NSA guidelines
by Kevin Bailey 10 March 2021
Why are you ignoring NIST, NSA and the NCSC? These agencies have all published final or preliminary (beta) guidance for Zero Trust (ZT) that is applicable to all sizes of organisations. I would suggest to you that the agencies are experts in the field of cybersecurity. So why are vendors and influencers ignoring the agencies’ guidance when proposing to be an advocate of ZT?
the first of four chapters delving into the insights of 28 CISOs across US and Europe
by Kevin Bailey 17 February 2021
The first of four episodes (chapters) delving into the insights of 28 leading CISOs across US and Europe, conveying the challenges facing these leaders, how they are tackling them and examples of who is succeeding
by Kevin Bailey 15 February 2021
 I don’t apologise for bringing Simon Cowell into the world of cybersecurity. Any followers during the auditions of X-Factor will have experienced Simon’s rebuff for anyone that has a different opinion of their singing ability compared to that of his, receiving the customary “your opinion, although interesting is irrelevant”. This doesn’t mean that Simon is always right, it’s just his opinion. Cybersecurity a decade ago was all about opinions. ‘Experts’ would attract a following by stating their opinions on the current and future activities of hackers based on belief, gut instinct and, if you were a vendor, using impressive acronyms, fear, uncertainty and doubt to sell your products. Accelerate forward a decade and securing your business, employees and customers is now a critical obligation to maintain business stability and growth. Uncorroborated opinions are now just noise, reserved for building followers, creation of sensationalised headlines and badly constructed marketing materials. Decades of research have shown that humans are so-called 'cognitive misers'. When we approach a problem, our natural default is to tap the least tiring cognitive process. Typically, this is what psychologists call type 1 thinking ; automatic, intuitive processes that are not very strenuous (Daniel Kahneman), in contrast to type 2 thinking , which is slower and involves processing more cues in the environment. When you drill it down, our thoughts about success, failure and beliefs, related to work and anything personal to us is driven by data, regardless of whether it comes from automatic type 1 or slower type 2 thinking. It’s your choice how much effort you want to spend understanding the subject [opinion].
Show More
Share by: