Guest on KBKast – Navigating the Wild West

Guest on KBKast – Navigating the Wild West

Navigating the Wild West I had the privilege of being on episode 215 of Karissa’s KBKast podcast where we chatted about tools and techniques to assess the security and integrity of Open Source software. The conversation started out with me highlighting the...

Auckland’s Transport System Hit by Ransomware Attack

The Auckland Transport authority in New Zealand has suffered a cyber security incident that is impacting a wide range of customer services. Auckland Transport is the transportation authority in the Auckland region. They look after transport infrastructure and are...
Future of Security – Melbourne 2023

Future of Security – Melbourne 2023

I had the great opportunity to speak in Melbourne at the FST Future of Security Event. I participated in the Preventing Cyber Attacks Panel Discussion and we spoke on the following agenda: Establishing a proactive post-quantum security framework that secures your data...
Guest on Secure by Galah Cyber Podcast

Guest on Secure by Galah Cyber Podcast

I had the privilege to be Cole Cornford’s guest on his Secure by Galah Cyber Podcast. He starts of by asking which bird I’m most like and why. I said that I’m an owl as everyone in security should be doing lots of listening and watching. It’s...

5 Steps for Securing Your Software Supply Chain

RSA Conference just published an article that I’ve written on the 5 steps for securing your software supply chain. Most modern applications are assembled from open source components with developers typically writing less than 15% of the code for their...
How Secure Is Your iPhone?

How Secure Is Your iPhone?

The Wall Street Journal has written an article that will challenge your belief on the security of your digital life. It reports on how a basic iPhone feature can allow criminals to steal your entire digital life. This basic feature is your pass code and the technique...