One of my favourite bloggers Troy Hunt posed a question on Twitter yesterday asking whether a user should share responsibility for a weak password that they reuse across multiple services. There was a lot of great discussion and debate, and I found myself opposing Troy’s views. It was getting late in the night and despite … Continue reading Victim-blaming by any other name still smells just as bad
Red Hat was recently acquired by IBM for and eye-watering $34 Billion, and while it's the largest deal of its nature, it did get me curious as to how frequent it is for open-source companies to get involved in a bit of M&A. To keep it simple outside of my usual IT Security wheelhouse, let's … Continue reading Buying Open Source
October is National Cyber Security Awareness Month (NCSAM), but why restrict it to a month, when we need it all year round. So, I created a few very short videos on a few security awareness topics. The idea was to keep them short enough so people would watch them to the end, have a bit … Continue reading National Cyber Security Awareness Month
via IFTTT Another busy and enjoyable day at the AT&T business summit in Dallas. Today was spent mainly in sessions, and I ended up spending an hour in an 'ask the expert' session as well as getting interviewed by Shira Rubinoff. Yay, go me! Tomorrow is the last day, and I have a very important … Continue reading AT&T Business Summit day 2
via IFTTT I'm in Dallas, and there's not Ewing in sight. Luckily, what is here, is a great business summit. Here are some of the highlights from day 1 where I spent most of the time drooling over the booths.
I got the dates wrong in the video, should have said 21st Aug to 5th Sept. But, this is me looking at the whole incident as a customer, not as a security professional. I received the email notification from British Airways informing me of the breach and the fact that customers payment and personal information … Continue reading British Airways breached
Around 2006 / 2007 I began blogging and tried to get into video blogging. Although I’d been working in information security for 7 years up to that point, I wasn’t well-connected in terms of what conferences ran, who the influencers were, or who the editors of any of the numerous security magazines or websites were. … Continue reading The Queen Agrees