Aug 22, 2023 | Posts, Speaking
I had the great opportunity to speak in Melbourne at the FST Future of Security Event. I participated in the Preventing Cyber Attacks Panel Discussion and we spoke on the following agenda: Establishing a proactive post-quantum security framework that secures your data...
Jul 7, 2023 | Podcast, Posts, Speaking
I had the privilege to be Cole Cornford’s guest on his Secure by Galah Cyber Podcast. He starts of by asking which bird I’m most like and why. I said that I’m an owl as everyone in security should be doing lots of listening and watching. It’s...
Apr 21, 2023 | Articles, Podcast, Posts
RSA Conference just published an article that I’ve written on the 5 steps for securing your software supply chain. Most modern applications are assembled from open source components with developers typically writing less than 15% of the code for their...
Feb 27, 2023 | Articles, Podcast, Posts
The Wall Street Journal has written an article that will challenge your belief on the security of your digital life. It reports on how a basic iPhone feature can allow criminals to steal your entire digital life. This basic feature is your pass code and the technique...
Mar 12, 2020 | Articles, Posts
A few weeks ago, a friend who looks after a web server had an outage on their website and asked me to help troubleshoot. The cause of the outage surprised me and is the reason why I’m writing about it. The website outage was due to a dependency it had on the server of...
Oct 12, 2018 | Articles, Posts
That was the main take away for me from today’s talks by SANS instructor Eric Johnson. He was in the country running a workshop and talk at AISA conference in Melbourne and SANS contacted me if I was interested in having him doing a private talk to the team. I was...