Free Post hacking my old blog Hacking my old blog: part 4, security fixes To finish off the series, I discuss some of the mechanisms that could have been used to protect my old blog.
Free Post hacking my old blog Hacking my old blog: part 3 The final post in the attack phase of this series.
Free Post hacking my old blog Hacking my old blog: part 1 A dig around my old blog to see if I can hack it.
Free Post cyber security Dealing with low hanging fruit Deal with the easy quick wins before you have an external testing team perform their audit.
Free Post cyber security My CISSP experience In early September 2020 I studied for the CISSP at an intensive six day course.
Free Post cyber security "We have conducted a review to ensure this never happens again" If you're going to claim to have "conducted a review" you need to make sure your response is appropriate and useful.
Free Post cyber security Dealing with Ransomware - a real life tale Thinking clearly during a ransomware attack is key, helping to save your data.
Free Post cyber security Permissions vs authority A discussion of the differences between "having permissions" and "having authority".
Free Post eVitabu Why we chose OAuth for eVitabu User authentication is an important consideration when designing any system. Here's how we decided to use OAuth for eVitabu.
Free Post conference Towards a safe and secure smart world (conference) A summary of my key take aways from January's conference.
Free Post cyber security Learning from cyber attacks Cyber attacks are a regular occurrence, and it's important that we learn from them.
Free Post cyber security Reusing paper - good for the environment, risky for privacy It's important to review the paper you re-use to avoid leaking confidential information.
Free Post cyber security Delegated trust vs Web of Trust The difference between the web of trust and delegating your trust to a third party.