Data is difficult!
Read More: Data is difficult!Know your Data? (link below)….. Data is difficult, Categorising and securing Data is difficult, I personally rate this as a 4 or 5 out of 5 stars in my Cyber Security complexity Framework. Meaning that it is my opinion that this is not the place that most organisations looking to reduce their Cyber Risk should…
6502 – coming back to life?
Read More: 6502 – coming back to life?For those who know what the above is then kudos to you 😀 I grew up using an Atari 130XE with a 1.7 MHZ 6502C and as my first computer I loved it and the freedom it created for me to program and to play games! The 6502 is coming back to life in a…
Marketectures are not what the Client Needs
Read More: Marketectures are not what the Client NeedsThe recent security reference architecture document recently released by Microsoft is a glaring indictment of where the Cyber Security industry is in 2021. A Sprawling cityscape of Vendors Spruking their “Better Mouse Traps” (Thanks Bryan). Organisations have massive spaghetti junctions of interconnecting applications, services, users and platforms. Familiar with the below? this was my life…
Welcome to mass Travel disruption!
Read More: Welcome to mass Travel disruption!The shape of things to come for Australians? ….. I am the worst at actually printing out a “Hard copy” of any ticketing or required material, I like to rely on Technology and use the apps on my phone…. It is guaranteed …… without a doubt that our “Vaccination Certificate” Covid Government app back-end infrastructure…
Work from home? hacking is cheap to start out in
Read More: Work from home? hacking is cheap to start out inComing back to what I have discussed before, it is really cheap to get started as a “Wannabe” haxxor…… just search Reddit for red teaming and join the groups for public “Proof of Concept” hacks for each new vulnerability as it is announced (seriously!) ……. There are two solutions to this, either may be suitable:…
Find a Vulnerability in Software, Get sued by Vendor
Read More: Find a Vulnerability in Software, Get sued by VendorBad form or what? Find a Vulnerability, notify the vendor, get sued! IMHO, many vulnerabilities are not published already, and this only makes it worse….. sell the vulnerability on the Dark Web = profit. Let the Vendor know about it ….. get punished? Reason #233 for having a Cyber Security plan in place to protect…
When Smart locks are too smart!
Read More: When Smart locks are too smart!larger than the problem itself?
You will be Attacked! What do you do?
Read More: You will be Attacked! What do you do?Cyber Security is a necessary part of your operation, no Cyber Security plan places your business at risk of being ruined, unlike traditional theft where a criminal needs to breach your physical office location. A Cyber Security attack from criminals is targeted across as many businesses as they can reach, searching for an easy victim,…
Artificial Intelligence?
Read More: Artificial Intelligence?Artificial Intelligence is not always Artificial Intelligence, every Cyber Security vendor selling solutions today is either putting an “using AI” sticker on their website, or they are investigating how they can use Artificial Intelligence “AI” and Machine Learning “ML”in their branding. It stands to reason as the terms are well on the incline of the…
Help! choose a vendor
Read More: Help! choose a vendorIn the Cyber Security industry there are no sure bets, large companies have revenue and legacy products to protect, which stifles innovation.