Analysing global revenue opportunities for cyber security companies.


Synergy Six Blog 2023

SIX DEGREES of INFORMATION

The Six Degrees of Information blog provides readers with insights into an array of topical content that covers a variety of concerns, issues and fun.

by Kevin Bailey 29 Feb, 2024
Read my review of Commvault's recent London SHIFT event.
by Kevin Bailey 30 Jan, 2024
How can you recover from three copies of data when two may have been compromised and recovery may cost you $100,000's of unbudgeted spend to meet your RTO.
by Kevin Bailey 01 Nov, 2023
But what new knowledge will be shared off the ride in 2023
by Kevin Bailey 14 Dec, 2022
The principles of decentralising one's information into their own ownership are completely related to, and contextualised by, privilege.
HP Wolf Security finds Patching is too slow to react. Replace IDS with NDR
by Kevin Bailey 14 Oct, 2021
HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch. It's time to consider NDR that is fast to deploy, detect and [automatically] respond, before the malware can hit the endpoint. IDS and IPS just don't cut it anymore,
zero trust is being exploited and not aligned to the NIST, NCSC and NSA guidelines
by Kevin Bailey 10 Mar, 2021
Why are you ignoring NIST, NSA and the NCSC? These agencies have all published final or preliminary (beta) guidance for Zero Trust (ZT) that is applicable to all sizes of organisations. I would suggest to you that the agencies are experts in the field of cybersecurity. So why are vendors and influencers ignoring the agencies’ guidance when proposing to be an advocate of ZT?
the first of four chapters delving into the insights of 28 CISOs across US and Europe
by Kevin Bailey 17 Feb, 2021
The first of four episodes (chapters) delving into the insights of 28 leading CISOs across US and Europe, conveying the challenges facing these leaders, how they are tackling them and examples of who is succeeding
by Kevin Bailey 15 Feb, 2021
 I don’t apologise for bringing Simon Cowell into the world of cybersecurity. Any followers during the auditions of X-Factor will have experienced Simon’s rebuff for anyone that has a different opinion of their singing ability compared to that of his, receiving the customary “your opinion, although interesting is irrelevant”. This doesn’t mean that Simon is always right, it’s just his opinion. Cybersecurity a decade ago was all about opinions. ‘Experts’ would attract a following by stating their opinions on the current and future activities of hackers based on belief, gut instinct and, if you were a vendor, using impressive acronyms, fear, uncertainty and doubt to sell your products. Accelerate forward a decade and securing your business, employees and customers is now a critical obligation to maintain business stability and growth. Uncorroborated opinions are now just noise, reserved for building followers, creation of sensationalised headlines and badly constructed marketing materials. Decades of research have shown that humans are so-called 'cognitive misers'. When we approach a problem, our natural default is to tap the least tiring cognitive process. Typically, this is what psychologists call type 1 thinking ; automatic, intuitive processes that are not very strenuous (Daniel Kahneman), in contrast to type 2 thinking , which is slower and involves processing more cues in the environment. When you drill it down, our thoughts about success, failure and beliefs, related to work and anything personal to us is driven by data, regardless of whether it comes from automatic type 1 or slower type 2 thinking. It’s your choice how much effort you want to spend understanding the subject [opinion].
Why you need a DDoS Solution that is Always on and in Real-Time
by Kevin Bailey 08 Feb, 2021
Read how you can ensure that your DDoS mitigation solution meets the needs of the digital economy. How DDoS attacks directly impact your business; Why you are at risk without always-on, real-time DDoS security; Steps your business can take to ensure a strong security posture; Key assessment tools you can use to help align your DDoS strategy
Show More
Share by: