I was browsing the website formerly known as Twitter and saw this post by Trung Phan and it got me comparing it to cybersecurity. Or as my friend Thom Langford would say, "that's the sound of the analogy snapping as you stretched it way beyond its limits." But setting aside Thom's uncalled for comments (and … Continue reading When Less is More (And $ is Everything)
Category: blog
Protecting People, Not Just Data
As I sit here, reflecting on the recent news of the ransomware attack on pathology lab Synnovis, I can't help but feel a sense of unease wash over me. It's not just another headline or statistic; this time, it's a bit more personal. My neighbour, Oliver Dowson, is one of the many individuals directly affected … Continue reading Protecting People, Not Just Data
My thoughts and experiences at Infosec EU 2024
Another year another Infosec EU. So, how did it go down? I must admit, I grumble whenever I have to attend an event at the soulless warehouse that is ExCel, located in what can only be described as the appendix of London. However, it is a nice ride on the motorbike to get there, and … Continue reading My thoughts and experiences at Infosec EU 2024
Shared responsibility
I was taking a walk the other day and saw this pathway which is shared by two houses. The house on the right got their pressure washer and cleaned their half of the path. Part of me secretly admires the pettiness of this move. But the truth is that it is one path and just … Continue reading Shared responsibility
Wind turbines and lightning very very frightening – and cyber security
I saw a video on the BBC about a wind Turbine catching fire after a lightning strike. The video looked kind of cool as the flaming blades were spinning creating rings of smoke. With a bit of digging, it transpired that lightning strikes on wind turbines are very common and is only set to get … Continue reading Wind turbines and lightning very very frightening – and cyber security
Santa Cruz Police Nab 19-Year-Old for Fake Parking Tickets
Cops in Santa Cruz, California, were out in full force, arresting a 19-year-old they allege was behind a sinister plot to swindle unsuspecting beachgoers out of their hard-earned cash. The suspect, Damian Vela of Watsonville, had been placing counterfeit parking tickets on vehicles near the shoreline, complete with a QR code that victims could scan … Continue reading Santa Cruz Police Nab 19-Year-Old for Fake Parking Tickets
How One Jobseeker Used AI to Apply for 200 Jobs in 2 Days
The search for a job has never been easy, but with the commoditisation of AI tools, it's becoming a bit easier for the ambitious jobseeker. Recently, one such individual used AI to apply for nearly 200 jobs in the span of two days - a feat most of us can only dream of achieving. https://www.tiktok.com/@jerryjhlee/video/7181883906054966571?is_from_webapp=1&sender_device=pc&web_id=7182182950015485446 … Continue reading How One Jobseeker Used AI to Apply for 200 Jobs in 2 Days
Farcical Recognition
It was bound to happen - welcome to the future! Mom took her daughter to see a show. AI facial recognition software recognizes her and she’s unceremoniously escorted out by security. Her offence? Her employer, a huge law firm (not her) is in protracted litigation with the owner MSG Entertainment, and MSG has a policy … Continue reading Farcical Recognition
BH EU 2022 and BSides London
As I wandered through the psychedelic chaos of Black Hat Europe 2022, I couldn't help but feel like I had stumbled into the belly of the beast. The vendor area was a tacky nightmare of flashing lights and buzzword-laden sales pitches, but I knew there was something deeper lurking beneath the surface. And then, like … Continue reading BH EU 2022 and BSides London
Security Through Complexity
I saw this picture somewhere on social media of these many locks securing the bolt. However, upon closer inspection, you can see that by simply removing any one of the locks, you unlock the whole thing. I hope you'll allow me the opportunity of dragging this out into a cybersecurity analogy. But, sometimes the sheer … Continue reading Security Through Complexity
