If everyone and their dog is talking about Meltdown and Spectre, then it would be negligent of me to not keep up with all the cool kids. Website for the vulnerabilities: Meltdown Attack Google Project Zero blog NCSC’s advice Linus Torvalds statement

Work for long enough in one industry for any period of time and you end up speaking an entirely language altogether. This isn’t necessarily a bad thing, in many cases it’s convenient and allows rapid communication amongst peers. However, in Information security we need to be mindful when communicating with non security, or even non […]

I thought I’d kick off the new year by poking around the news stories, surely not much could have happened. But quite a lot did unfortunately. In the video are the top 3 stories or headlines that caught my attention, but more importantly, I think we should make a pact to stop using these buzzwords […]

Fuelled by a twitter conversation both Adrian Sanabria and Anton Chuvakin posted articles here and here, sharing some good tips on what makes a good briefing and common pitfalls to avoid. As a former (recovering?) analyst, I thought it only right that I jump on the bandwagon and share my thoughts on the topic. What […]

M&A in the infosec world has waited for the holiday season to go all out splashing its cash. A flurry of activity has occurred at the tail end of the year with considerable consolidation. Proving that encryption and identity management is no slouch, Thales has made an eye-watering bid of $5.7bn to acquire Gemalto, a […]

Infosec companies don’t always get the love they deserve from the markets once they IPO. As Barracuda Networks discovered despite posting respectable profitable growth. PE firm Thoma Bravo stepped in, paying $27.55 per share for Barracuda in a $1.6bn move taking it private. The market can be unforgiving, even when a company like Barracuda is […]

Honoured to be the guest editor for Infosecurity Magazine yesterday. It was a day of fun which involved several things: 1. The announcement was made, which included this video 2. I took over their twitter account for an hour (brave of them) 3. I submitted a guest editorial 4. Had a Q&A with the real […]

My staff log onto my computer on my desk with my login everyday. Including interns on exchange programmes. For the officer on @BBCNews just now to claim that the computer on Greens desk was accessed and therefore it was Green is utterly preposterous !! — Nadine Dorries (@NadineDorries) December 2, 2017 This tweet by member […]

It was my first time in Lisbon, it was my first time keynoting at a Bsides… what could possibly go wrong? Thanks so much to the whole team and attendees at BSides Lisbon for a fantastic event! You can read my full writeup on the event over on my AlienVault blog. It includes a link […]

via IFTTT Read the original blog by Rowenna here: http://ift.tt/2zgNKou If PCI DSS paid off the mortgage, then GDPR looks well on its way to buy the yacht. But how does one go about making some of that GDPR gangster money if they don’t know much about the regulation? Well, becoming a GDPR consultant is […]

Becoming a thought leader is the epitome of professional success. But a thought leader isn’t a title that one attains by going to Harvard, or Cambridge. No, it’s a title bestowed by your peers. So how does one become known as a thought leader? Simple, just watch this video and follow the awesome advice given […]

I’m truly honoured to have been invited to keynote at Bsides Lisbon this year on November 10th. It’ll be the first time I’ve visited Portugal, and the first time I’ve keynoted at a Bsides. Ordinarily I’d probably be feeling a bit apprehensive of speaking at a conference that I haven’t even attended, let alone keynote […]

I have Amazon Prime, I quite like their shows, and whenever I have some time to kill I’ll watch an episode or 3. A couple of weeks ago, I thought it would be a good idea to install the official Amazon video app on my android device, so that I could download episodes and watch […]

via IFTTT Someone asked me if there are any unusual or legitimate uses for ransomware. If you break down what ransomware is, it’s just encryption. But it’s more like “surprise” encryption where someone else does the encryption, and keeps the key. So, I present five unorthodox ways to use ransomware in this video. However, if […]

Bugcrowd has announced a new CEO, Ashish Gupta to take the helm from founder Casey Ellis, who has stepped aside to assume the role of Chairman and CTO of the firm he founded five years ago in 2012. The move shows a level of maturity on behalf of the company, and indeed Ellis. Startup founders […]

T-shirts are among the most popular giveaways at security conferences. They’re great, practical, and serve as walking advertisements. But if you go to enough conferences, you’ll usually find yourself accumulating far too many shirts. There are only so many shirts you can use to wear when working out, or doing DIY projects, or as rags […]

via IFTTT Recently, security researcher Leigh-Anne Galloway (@L_AGalloway) found a vulnerability on Myspace, my first thought was amazement that Myspace still existed. It’s one of the sites that seems to have been lost in the digital abyss, like tears in the rain. The details of the vulnerability (which appears to have been fixed now) can […]

Spent a day with the BBC, and hosted a tweetchat. Just an ordinary day, no biggie.Link to the tweetchat moment: GDPR tweetchat Tweetchat blog isn’t about, but keep your eye on http://ift.tt/1s8wHrF for info

One man, two conferences, three days. The conferences http://ift.tt/29JwqL2 http://ift.tt/2uc7aIJ My band, Host Unknown hostunknown.tv

It’s a parody deliberately intended to be as bad as possible as a form of artistic expression depicting the state of security in the world today set against the backdrop of the rise of ransomware. Seeking to answer the mysteries of humans, life, and the universe.