It looks like I cannot get away from articles about passwords, which is not really a bad thing as passwords are still fundamental to everyone’s cyber security. I often read in the cyber security technical press that cyber attacks on even the biggest organisations start with the compromise of a …
In Support of Encryption
The idea for this article on encryption came to me whilst reading Joe Haldeman’s The Hemingway Hoax (see the disclaimer at the end of this article) – written in 1990 it was slightly ahead of the computer revolution. In the book, three people are involved in a fraud to produce …
The Wednesday Bit this week
One thing I learnt very quickly whilst studying and after graduation was that my degree in cyber security was only the tool to make me think about cyber security properly and unless I kept my personal study up to date the degree would soon become useless. That is why I …
Fire Risk!
I get asked some strange cyber security questions. Such as “…why should I be bothered with MFA?” Find out the answer to that one this Thursday on Cyber Awake. “Do I really need to think about the paperwork my team leaves lying around our office?”. The answer to that one …
Defence in Depth
One of the things that came out of the conference I attended on Tuesday in London, was defence in depth, combatting the ways in which the threat actors have expanded their attack vectors and tactics to evade various modern technical and human defences. The message we should all take from …