Hacker History III: Professional Hardware Hacker

Hacker History III: Professional Hardware Hacker

Following on from my C64 hacking days, but in parallel to my BBS Hacking, this final part looks at my early hardware hacking and creation of a new class of meteorological research radar...Ever since that first C64 and through the x86 years, I’d been hacking away – mostly software; initially ... Read More
Hacker History II: The BBS Years

Hacker History II: The BBS Years

Post-C64 Hacking (in Part 1 of Hacker History)... now on to Part 2: The BBS YearsLate 1986 (a few months before I started my first non-newspaper delivery and non-family-business job – working at a local supermarket) I launched my first bulletin board system (BBS). I can’t remember the software that ... Read More
Hacker History I: Getting Started as a Hacker

Hacker History I: Getting Started as a Hacker

Curiosity is a wonderful thing; and the key ingredient to making a hacker. All the best hackers I know are not only deeply curious creatures but have a driving desire to share the knowledge they uncover. That curiosity and sharing underpins much of the hacker culture today – and is ... Read More
Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings

Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings

Policing in the 21st Century is obviously changing rapidly. New technological advances are fundamentally changing the way in which police forces and related government entities can track, locate, and collect evidence.Two game changing technologies - working together - perhaps underpin the greatest tool for policing the world over. The combination ... Read More
The Diet Pill Security Model

The Diet Pill Security Model

The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one - depending ... Read More
The Missing Piece of the Security Conference Circuit

The Missing Piece of the Security Conference Circuit

| | Conferences, security, training
So far this year I think I've attended 20+ security conferences around the world - speaking at many of them. Along the way I got to chat with hundreds of attendees and gather their thoughts on what they hoped to achieve or learn at each of these conferences.In way too ... Read More
The Security Talent Gap is Misunderstood and AI Changes it All

The Security Talent Gap is Misunderstood and AI Changes it All

| | AI, Cloud, future, security
Despite headlines now at least a couple years old, the InfoSec world is still (largely) playing lip-service to the lack of security talent and the growing skills gap.The community is apt to quote and brandish the dire figures, but unless you're actually a hiring manager striving to fill low to ... Read More
Cyber Scorecarding Services

Cyber Scorecarding Services

Ample evidence exists to underline that shortcomings in a third-parties cyber security posture can have an extremely negative effect on the security integrity of the businesses they connect or partner with. Consequently, there’s been a continuous and frustrated desire for a couple of decades for some kind of independent verification ... Read More
NextGen SIEM Isn’t SIEM

NextGen SIEM Isn’t SIEM

Security Information and Event Management (SIEM) is feeling its age. Harkening back to a time in which businesses were prepping for the dreaded Y2K and where the cutting edge of security technology was bound to DMZ’s, Bastion Hosts, and network vulnerability scanning – SIEM has been along for the ride ... Read More
Lock Picking at Security Conferences

Lock Picking at Security Conferences

Both new and returning attendees at technical security conferences are often puzzled by the presence of lock picking break-out areas and the gamut of hands-on tutorials. For an industry primarily focused on securing electronic packets of ones and zeros, an enthusiasm for manual manipulation of mechanical locks seems out of ... Read More
Loading...