October is National Cyber Security Awareness Month. Delivering effective cyber security awareness is an ongoing process, and not one that can be solved in one month a year. But that doesn’t mean we shouldn’t try. Staying safe online has many similarities with staying safe on the line aka tightrope walking. It involves a delicate mix … Continue reading Every day is cyber security awareness month
Author: j4vv4d
What Your CISO Can Learn From Logan Paul vs Floyd Mayweather
Logan Paul and his brother Jake Paul are what you could call social media celebrities. They amassed over 20 million followers across YouTube, Vine, Instagram, and others over the years through different types of content, sketches, and pranks. To anyone over the age of 35, they probably are considered a fad, forgettable, a representation of … Continue reading What Your CISO Can Learn From Logan Paul vs Floyd Mayweather
How I pwned an ex-CISO and the Smashing Security Podcast
Disclaimer, this was a bit of fun with consent. But there are some worthwhile things to bear in mind. If you're predictable, then criminals can take advantage of that. If someone knows what your pattern is to set passwords e.g. FacebookPassword1, TwitterPassword1, then you can easily guess what your other passwords are. Similarly, if you … Continue reading How I pwned an ex-CISO and the Smashing Security Podcast
Leaving WhatsApp – Treating the Symptom, Not the Cause
A few months ago, many people were riled up over the proposed updates to WhatsApp terms and conditions. The popular messaging service which was acquired by Facebook in 2014 for $16bn, was apparently updating its Ts and Cs which users had to either accept or choose to leave. While the whole thing seems to have … Continue reading Leaving WhatsApp – Treating the Symptom, Not the Cause
Fisherian Runaway
Today I learn the phrase Fisherian Runaway, which was a term coined by mathematical biologist Ronald Fisher to account for the evolution of exaggerated male ornamentation, e.g. peacocks with their big tails. I wonder if we've fallen into the same trap within cyber security - especially when it comes to what gets researched, reported, and … Continue reading Fisherian Runaway
Don’t run that code
Hear the blog narrated The dangers of downloading untrusted code from the internet is well documented. You never know what is contained within someone else's code, be it sloppy coding, or malicious intent. If it is a snippet of code that you can easily read, it can be relatively risk free. Because, why put in … Continue reading Don’t run that code
I’ve made it!
First off, happy new year! (Well if the tax man can start the new year in April, I can start it on Feb 11th!) Secondly, Infosecurity Magazine was ever so kind as to feature an interview with me in the Q1, 2021, Voume 18, Issue 1 edition. (the link should take you to the digital … Continue reading I’ve made it!
Winding down 2020
From a creative perspective, 2020 hasn't been a bad year for me. I ended up writing, 80 blog posts (most of which were published elsewhere) created 54 videos, 48 podcasts, and 48 presentations and webinars. I guess lockdown gave me more time to mull on things and be more productive. Despite the fact that I … Continue reading Winding down 2020
My top 5 videos of the year
Following on from last weeks post in which I summed up my top 5 blogs of the year, the sequel that one person asked me for was, what were the most watched videos of mine during 2020? Well, wonder no more, as I give you the top 5 in reverse order, cue the Top of … Continue reading My top 5 videos of the year
My Top 5 Blogs of the Year
I saw Cygenta posted their top 5 blogs of the year on Twitter and thought that it was a wonderful idea to rip off / borrow / be inspired by. So, I proudly present, my top 5 read blogs during the course of 2020. From my blog that is. I've written many other articles on … Continue reading My Top 5 Blogs of the Year
