Disclaimer, this was a bit of fun with consent. But there are some worthwhile things to bear in mind. If you're predictable, then criminals can take advantage of that. If someone knows what your pattern is to set passwords e.g. FacebookPassword1, TwitterPassword1, then you can easily guess what your other passwords are. Similarly, if you … Continue reading How I pwned an ex-CISO and the Smashing Security Podcast
Category: blog
Blog Post
I’ve made it!
First off, happy new year! (Well if the tax man can start the new year in April, I can start it on Feb 11th!) Secondly, Infosecurity Magazine was ever so kind as to feature an interview with me in the Q1, 2021, Voume 18, Issue 1 edition. (the link should take you to the digital … Continue reading I’ve made it!
Winding down 2020
From a creative perspective, 2020 hasn't been a bad year for me. I ended up writing, 80 blog posts (most of which were published elsewhere) created 54 videos, 48 podcasts, and 48 presentations and webinars. I guess lockdown gave me more time to mull on things and be more productive. Despite the fact that I … Continue reading Winding down 2020
My top 5 videos of the year
Following on from last weeks post in which I summed up my top 5 blogs of the year, the sequel that one person asked me for was, what were the most watched videos of mine during 2020? Well, wonder no more, as I give you the top 5 in reverse order, cue the Top of … Continue reading My top 5 videos of the year
My Top 5 Blogs of the Year
I saw Cygenta posted their top 5 blogs of the year on Twitter and thought that it was a wonderful idea to rip off / borrow / be inspired by. So, I proudly present, my top 5 read blogs during the course of 2020. From my blog that is. I've written many other articles on … Continue reading My Top 5 Blogs of the Year
Middle Brothers
When we talk about privacy and surveillance, discussions usually involve talk of Governments keep the population under manners. But unlike the good old days of the eighteenth century, Governments aren’t the only ones with skin in the population monitoring, control, and profiteering business. We now have a whole slew of middle brothers aka big tech … Continue reading Middle Brothers
The Predictions Dilemma
The last quarter of the year is also known as predictions season. It's the time where those who consider themselves to be wise and enlightened rub their chin thoughtfully and spout the wisdom of what the future holds. I should know, in my days as an industry analyst I was often called upon as a … Continue reading The Predictions Dilemma
Why Predator is the ultimate CISO movie
There's often a lot of debate as to what the best security or hacking movie is. Many people talk about Hackers, or Sneakers, or try and slip Mr Robot into the mix. But they are all way way waaaaay off the mark. I was reminded of this by Phil Cracknell who posted on linkedin that … Continue reading Why Predator is the ultimate CISO movie
The future often looks silly
I just took a photo of my scribblings on my whiteboard. The automation workflow will trigger that photo to be uploaded with that relevant project. Technology is but a mere extension of me. As I sit down, I recall a time, probably around 2006 because it was before the iPhone came out and only important … Continue reading The future often looks silly
A 5-step process for nearly anything
I have been (slowly) reading Atomic Habits by James Clear. It's a great read and I'll probably write up some of my notes once I'm finished. If you're not familiar with the book, I do recommend it, or at least subscribing to his weekly newsletter 3-2-1. It was in the most recent newsletter in which … Continue reading A 5-step process for nearly anything