J4vv4D

Stuff Shoved Under blog

Infosec conferences – client side vs server side

Because infosec has cured cancer, ended poverty and created a utopian paradise that the villain in Demolistion Man could only dream of – the industry often finds itself trying to fix the really big issues via twitter and other social media platforms as well as within the hallways of conferences as to what is wrong…

filed under blog

Security and the cobra effect

Some people just want to watch the world burn. Others just want to give bad security advice. Check out Troy Hunt’s blog post on the matter.

filed under blog, Video

The CISSP companion handbook: A collection of tales, experiences and straight up fabrications fitted into the 10 CISSP domains of information security

I didn’t write the book, the book wrote me. Which is kind of true because I kind of wrote a lot of stuff independently and then combined it with some of my old notes that I took whilst preparing for the exam and scoured through old emails for the rest.   It’s definitely not something…

filed under blog

We won!!!

If you like to keep up with my ramblings on the Facebook or twitter, you’d probably have seen that not only was I nominated in several categories for the European Security Bloggers Awards, but so was Girl Cynic. Well, apparently Girl Cynic has been doing something right because she won the award for most entertaining…

filed under blog

A friend with photoshop is all you need

Jimmy is a good guy – I like him, he works in security and trains MMA. Which means if he can’t gain access to your server, he’ll simply beat the password out of you. Then he posted this picture on twitter in a cowboy hat.  As they say, a little photoshop is a dangerous thing…

filed under blog, Uncategorized

Here’s full disclosure – now no disclosure

Full disclosure has announced it’s shutting down. Even people far more capable than me are trying to comprehend why. One of the key grievances cited by John as to why Full Disclosure is being shut down was the constant battling against trolls – even from within the security community. It raises a number of interesting…

filed under blog

The Cyber Security Skills Gap

Monday morning and RSA 2014 has not even properly started but there I was up on stage in front of a rather packed room. Feeling jet-lagged and wishing I had more caffeine in my system, I was glad that I was simply moderating a panel which included Dwayne Melancon, Andy Ellis, Jane Lute and Mike…

filed under blog

The top amazing people you should know about

Search engine optimization (or SEO) is a thing. Well, I’m not too sure how big a thing it is now, but it used to be huge. The concept was / is that if you sneak the right words onto your website or blog post, then people searching for that particular term will end up coming…

filed under blog

(ISC)2 election and the butterfly effect

It had been a busy day at work and I was glad to be home. My wife had told me she’d be taking the kids out after school to a friends house so I knew no-one was home – yet I still announced loudly “Hello, I’m home.” We had been burgled a few months earlier…

filed under blog

RANTing Rockstar

The monthly RANT in London that is always good entertainment. It must have been eating its greens because it’s all grown up and had its first full on conference. If you want a proper review you can read write ups by Thom Langford or Lee Munson. I was looking forward to attending, and was honoured to be…

filed under blog