Victim-blaming by any other name still smells just as bad

Victim-blaming by any other name still smells just as bad

| | Blog
One of my favourite bloggers Troy Hunt posed a question on Twitter yesterday asking whether a user should share responsibility for a weak password that they reuse across multiple services. There was a lot of great discussion and debate, and I found myself opposing Troy’s views. It was getting late ... Read More

Buying Open Source

| | 4th Wall
Red Hat was recently acquired by IBM for and eye-watering $34 Billion, and while it’s the largest deal of its nature, it did get me curious as to how frequent it is for open-source companies to get involved in a bit of M&A. To keep it simple outside of my ... Read More
Awareness series -Phishing

National Cyber Security Awareness Month

| | Uncategorized
October is National Cyber Security Awareness Month (NCSAM), but why restrict it to a month, when we need it all year round. So, I created a few very short videos on a few security awareness topics. The idea was to keep them short enough so people would watch them to ... Read More
AT&T Business Summit day 2

AT&T Business Summit day 2

| | video
via IFTTT Another busy and enjoyable day at the AT&T business summit in Dallas. Today was spent mainly in sessions, and I ended up spending an hour in an ‘ask the expert’ session as well as getting interviewed by Shira Rubinoff. Yay, go me! Tomorrow is the last day, and ... Read More
AT&T Summit day 1

AT&T Summit day 1

| | video
via IFTTT I’m in Dallas, and there’s not Ewing in sight. Luckily, what is here, is a great business summit. Here are some of the highlights from day 1 where I spent most of the time drooling over the booths ... Read More
British Airways breached

British Airways breached

| | video
I got the dates wrong in the video, should have said 21st Aug to 5th Sept. But, this is me looking at the whole incident as a customer, not as a security professional. I received the email notification from British Airways informing me of the breach and the fact that ... Read More
The Queen Agrees

The Queen Agrees

| | Blog
Around 2006 / 2007 I began blogging and tried to get into video blogging. Although I’d been working in information security for 7 years up to that point, I wasn’t well-connected in terms of what conferences ran, who the influencers were, or who the editors of any of the numerous ... Read More

Social, the final frontier

| | Javnalysis
Social channels are an oft-overlooked area when it comes to information security. Social channels are left in the hands of marketing departments for customer engagement purposes. However, the adoption of social digital tools for the purposes of conducting business is widespread and largely unregulated, creating a major area of risk ... Read More

The user awareness landscape

Overall, technologies can be pretty straightforward to secure. Teach software not to execute a certain command, block a port, or alert on a set of conditions, and it will abide. Humans, on the other hand are not as easy to harden against attacks. These attacks are frequently delivered through emails, ... Read More

Security in the cloud

This video was prompted by discussions with someone that was adamant that they would never, never, everrrrr put their logs in the cloud. I enquired as to why they weren’t open to the option, and their response was that they don’t believe that sensitive information like logs should be in ... Read More
Loading...