I've seen VC's fund many security and tech startups. Lots of the ideas are rubbish, so I've come up with my own ideas that aren't rubbish so VC's can fund me instead. Don't steal any of my ideas or I will sue you! Take a human skull and 3D print an eyeball on it, add … Continue reading Cybersecurity startup ideas
The Future of Cybersecurity Isn’t What We Expected
We were told that by now, we would live in a perfect world with flying cars. But that hasn't arrived yet. We also believed that cybersecurity would be a problem that would have been solved, but it just seems to be getting worse. But what if the problem isn't getting worse. What if we have … Continue reading The Future of Cybersecurity Isn’t What We Expected
Roll your own VPN and other tech advice
Like many people, over the last couple of years, my main real interaction with people outside of my immediate family and Amazon delivery drivers has been via the internet. The beauty of the internet is that you donโt need to shower, put on decent clothes, or worry about offending anyone. If anything, offending someone is … Continue reading Roll your own VPN and other tech advice
Setting a Guinness World Record
Iโve been thinking of the best way to write this post for several days. Many drafts have ended up being deleted. Which, to be honest, doesnโt have the same visual satisfaction as seeing pages crumpled up into balls and tossed across the room into the bin. But here we are. Last week, KnowBe4, OneLogin, and … Continue reading Setting a Guinness World Record
Every day is cyber security awareness month
October is National Cyber Security Awareness Month.ย Delivering effective cyber security awareness is an ongoing process, and not one that can be solved in one month a year. But that doesnโt mean we shouldnโt try. Staying safe online has many similarities with staying safe on the line aka tightrope walking. It involves a delicate mix … Continue reading Every day is cyber security awareness month
What Your CISO Can Learn From Logan Paul vs Floyd Mayweather
Logan Paul and his brother Jake Paul are what you could call social media celebrities. They amassed over 20 million followers across YouTube, Vine, Instagram, and others over the years through different types of content, sketches, and pranks. To anyone over the age of 35, they probably are considered a fad, forgettable, a representation of … Continue reading What Your CISO Can Learn From Logan Paul vs Floyd Mayweather
How I pwned an ex-CISO and the Smashing Security Podcast
Disclaimer, this was a bit of fun with consent. But there are some worthwhile things to bear in mind. If you're predictable, then criminals can take advantage of that. If someone knows what your pattern is to set passwords e.g. FacebookPassword1, TwitterPassword1, then you can easily guess what your other passwords are. Similarly, if you … Continue reading How I pwned an ex-CISO and the Smashing Security Podcast
Leaving WhatsApp โ Treating the Symptom, Not the Cause
A few months ago, many people were riled up over the proposed updates to WhatsApp terms and conditions. The popular messaging service which was acquired by Facebook in 2014 for $16bn, was apparently updating its Ts and Cs which users had to either accept or choose to leave. While the whole thing seems to have … Continue reading Leaving WhatsApp โ Treating the Symptom, Not the Cause
Fisherian Runaway
Today I learn the phrase Fisherian Runaway, which was a term coined by mathematical biologist Ronald Fisher to account for the evolution of exaggerated male ornamentation, e.g. peacocks with their big tails. I wonder if we've fallen into the same trap within cyber security - especially when it comes to what gets researched, reported, and … Continue reading Fisherian Runaway
Don’t run that code
Hear the blog narrated The dangers of downloading untrusted code from the internet is well documented. You never know what is contained within someone else's code, be it sloppy coding, or malicious intent. If it is a snippet of code that you can easily read, it can be relatively risk free. Because, why put in … Continue reading Don’t run that code
