Data Security and Data Governance – Siblings from the same Parents
This article was originally published on July 17, 2020 on http://www.nicolaaskham.com Cyber security is a term often interchangeably used instead of Information Security or other scope specific terms such as Data Security, IT Security or Digital Security etc. The keyword here is “Security” of information in whatever format or scope it is presented be it […]
Does your Cyber Security Rigour match the Rigour and motivation of a Hacker?
This article was originally published on Linkedin on August 31, 2016 @ https://www.linkedin.com/pulse/does-your-cyber-security-rigour-match-motivation-alexander/ This question is becoming more relevant each passing day following the wave of high profile cyber attacks and data breaches reported in the media in recent times. As we all know for every reported breach there are hundreds if not thousands of unreported […]
Office 365 Does not Eliminate SaaS Application Risks
This article was originally published on Linkedin on August 22, 2016 @ https://www.linkedin.com/pulse/office-365-does-eliminate-saas-application-risks-alexander/ There appear to be some misinformation or misconception out there about what office 365 (O365) is and what it isn’t. O365 is a cloud based subscription of Microsoft office suite of productivity tools as opposed to desktop or locally installed versions. Essentially it […]
Security – A Digital Transformation Enabler

This presentation was first published on Linkedin on August 13, 2015 @ https://www.linkedin.com/pulse/security-digital-transformation-enabler-alexander/. Event: Whitehall Media Identity Management conference. The promises of the digital new world is inextricably locked with cloud computing technologies. Cloud computing technology is central to the converging interconnecting forces of collaboration, mobility, BYOD, IoT and social enterprise. The information/data security needs and […]