I have many discussions with clients about this topic – over-sharing. Whether it is in their social media, on their website or even on the notice board in the reception area. These snippets of information that are readily available without “hacking” are called OSINT – open source intelligence. The Internet …
Realistic Cyber Security
The Wednesday Bit is still on holiday! A couple of weeks back, whilst walking in Scotland, I got involved with a prospective client in a discussion about the benefits of our cyber security stack and in particular our Security Operations Centre. The discussion was not about “how much” but what …
Because It’s Friday – Motorway Driving
I am in Scotland this week, Edinburgh, Glasgow and Ayr, for work so my life contains a lot of motorway driving. That reminded me of this BBC archive video, from Blue Peter in 1965, of what motorways were like when they were first built. How many of you used to …
This is where I was yesterday…
7th Intl. Conference on Big Data, Cybersecurity & Artificial Intelligence Held in the spectacular main Lecture theatre on Edinburgh Napier University’s Craiglockhart Campus. The photo is of Professor Bill Buchanan’s opening keynote talk about AI and us. In between looking at how ChatGPT words can be found in university submitted …
It is hard to keep a secret
I have written many articles describing how the first steps in any cyber security plan has to be the recognition that you and your team need to be able to keep a secret. For instance the first secret is of course to keep any passwords you have been given access …