-
Aug 15, 2024
As smartphones continue to be an integral part of our daily lives, they also become increasingly valuable sources of digital evidence in investigations. Android, being one of the most widely used mobile operating systems, is often at the forefront of… read more »
-
Aug 14, 2024
Disclaimer: This post is purely satirical and should not be taken seriously. Any resemblance to actual management advice is purely coincidental. Discretion (and a sense of humour) is advised. Alert! A new plague sweeps through tech offices worldwide. Not malware,… read more »
-
Aug 4, 2024
A few days ago, while working on my highly customized Linux environment (which I detailed in my previous post about my tech setup), I realized that I was missing a key component: a robust clipboard manager. For those unfamiliar, a… read more »
-
Jul 30, 2024
In a departure from my usual topics of technology and cybersecurity, today I’d like to explore one of my other passions: music. While my blog typically delves into the intricacies of digital landscapes and security protocols, music has always held… read more »
-
Jul 25, 2024
Leadership, like a fingerprint, is unique to each individual who practices it. There’s no universal playbook, no one-size-fits-all approach to being an effective manager. However, throughout my career journey - both as a team member yearning for inspiring leadership and… read more »
-
Jul 21, 2024
A few weeks ago, I wrote a post exploring how themes from Cixin Liu’s science fiction masterpiece, “The Three-Body Problem,” could be applied to cybersecurity. The response was overwhelming, with several readers contacting me to tell me how the article… read more »
-
Jul 19, 2024
On Friday, July 19, 2024, a software update to Crowdstrike’s Falcon security system triggered a cascading failure that affected millions of Microsoft Windows systems worldwide. This incident, which wasn’t the result of a malicious attack but rather an unforeseen bug… read more »
-
Jul 19, 2024
Recently Google has announced its intention to acquire Wiz, a prominent Israeli cybersecurity company, for a staggering $23 billion. This potential acquisition, if successful, would not only be Google’s largest to date but also the biggest ever in the cybersecurity… read more »
-
Jul 16, 2024
As a manager, my primary responsibility is to create an environment where my team can thrive. The views I’m about to share are purely my own, derived not from management textbooks or theories, but from my many years of hands-on… read more »
-
Jul 14, 2024
Cloudflare offers a good VPN solution called Cloudflare Warp: this article delves into the intricacies of Cloudflare Warp, its foundation in Wireguard technology, and explores how users can harness its power using standard Wireguard clients, providing a flexible approach to… read more »
-
Jul 9, 2024
Our digital lives are an integral part of our overall existence. From social media and online banking to cloud storage and smart home devices, we constantly interact with digital systems that process and store our personal information. While these technologies… read more »
-
Jul 8, 2024
Okay, let’s chat about something that’s been bugging me lately - and I bet it’s been on your mind too. You know how it feels like every time you turn around, some big tech company is trying to sneak a… read more »
-
Jul 3, 2024
In the shadowy world of digital espionage and cyber warfare, knowledge is power. But in an era where data flows like water through the vast networks of our interconnected world, how do we separate the signal from the noise? Enter… read more »
-
Jul 2, 2024
Disclaimer: This post is entirely satirical and should not be taken seriously under any circumstances. Any resemblance to actual management advice is purely coincidental and probably a sign that you need to reevaluate your leadership style. Reader discretion (and a… read more »
-
Jun 29, 2024
As I closed the final pages of “Death’s End,” the concluding volume of Cixin Liu’s mind-bending “The Three-Body Problem” trilogy, I found myself awash in a sea of emotions and ideas. This epic saga, which had taken me on a… read more »
-
Jun 26, 2024
In a dynamic and ever-evolving field like cybersecurity it’s easy to get engrossed in the technical complexities and overlook the human element. However, over the years I’ve come to realize that kindness is not just a soft skill; it’s an… read more »
-
Jun 18, 2024
The workplace can be a whirlwind of overflowing inboxes, demanding deadlines, and the expectation of constant availability. This relentless pressure can lead to burnout, resentment, and a longing for a better balance between your professional and personal life. The key… read more »
-
Jun 17, 2024
In the cybersecurity domain, incident responders act as the secret agents on the front lines of digital conflict. They engage in relentless mitigation efforts against cyber adversaries who exploit vulnerabilities that have the potential to cripple organisational infrastructure. While their… read more »
-
Jun 12, 2024
Performing forensic analysis on mobile devices necessitates a suite of specialized tools to ensure that data acquisition, analysis, and reporting are conducted in a forensically sound manner. In this post I’ll try to delve into the technical aspects of several… read more »
-
Jun 7, 2024
Open Source Intelligence (OSINT) investigations serve as indispensable tools for uncovering valuable insights and mitigating potential risks. However, the efficacy of these investigations hinges upon the precision and clarity of the questions posed. Ambiguous or poorly formulated inquiries can derail… read more »