Wednesday, January 9, 2019
Hacker History III: Professional Hardware Hacker
›
Following on from my C64 hacking days, but in parallel to my BBS Hacking , this final part looks at my early hardware hacking and creation o...
Tuesday, January 8, 2019
Hacker History II: The BBS Years
›
Post-C64 Hacking (in Part 1 of Hacker History )... now on to Part 2: The BBS Years Late 1986 (a few months before I started my first non-n...
1 comment:
Monday, January 7, 2019
Hacker History I: Getting Started as a Hacker
›
Curiosity is a wonderful thing; and the key ingredient to making a hacker. All the best hackers I know are not only deeply curious creatures...
2 comments:
Tuesday, December 4, 2018
Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings
›
Policing in the 21st Century is obviously changing rapidly. New technological advances are fundamentally changing the way in which police fo...
Monday, October 1, 2018
The Diet Pill Security Model
›
The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver ...
Friday, September 21, 2018
The Missing Piece of the Security Conference Circuit
›
So far this year I think I've attended 20+ security conferences around the world - speaking at many of them. Along the way I got to ch...
The Security Talent Gap is Misunderstood and AI Changes it All
›
Despite headlines now at least a couple years old, the InfoSec world is still (largely) playing lip-service to the lack of security talent a...
Tuesday, April 24, 2018
Cyber Scorecarding Services
›
Ample evidence exists to underline that shortcomings in a third-parties cyber security posture can have an extremely negative effect on the ...
›
Home
View web version