UK Apprenticeships in Cyber Security

Cyber security apprenticeships are popping up a lot these days. Our company consistently hires apprentices throughout the UK, and our competitors in Europe and across the world are doing the same. Apprenticeship is a combination of on-the-job training (OJT) and...

read more

Educating yourself in information security

This will be a quick 500 – 1000 words on how to self educate in security. First, I will walk through some needed assumptions. Then I’ll wax philosophic about some of the things you should most definitely do. Then I’ll encourage you to find your own links using some...

read more

Always be learning

I went to a SANS workshop a few weeks ago, after spending a day mentoring young women in Step Into STEM mentoring program. I like London, there are a lot of talented people trying to help other talented people. I was asked about my specialty. “What is the one thing...

read more

Professional Business Career Paths in Infosec

I’m beginning this post talking about “professional” career paths in infosec. That’s a bit unfair to the brilliant professionals working in the technical side, and if you are technically minded and reading this, please don’t be offended. There is nothing...

read more

Technical Career Paths in Cyber Security

I’ve mentioned before that there are all kinds of people who find work in IT security. If you wanted to categorize, you could say that there are business people and technical people. That’s not entirely accurate, but for this topic today, let’s make it simple. I’d...

read more

Getting a job in cyber security

You’re about to embark on an incredible journey. For many, a position in security is like any other job with the project management, corporate ladder, sales bonuses, politics, management and straight forward objectives. If you are a professional then there will be a...

read more

How to act before you apply for a job

If you are trying to get into IT Security you should act in a specific way leading up to your job applications and interviews. Take yourself and the career seriously. Create an RSS feed and read security news and listen to security podcasts every day. Identify the...

read more

Are you a business grad? We need you in security

Most people looking to join this cool career are techies. They are hackers or hacker wanna-bes. Most young people I meet want to do Pen Testing. Pen Testing is ethical hacking. Hacking for fun and profit, legally. It's good fun. You solve problems. But if you look...

read more

Keeping Your Small Business Safe: 3 Easy Steps

There are dozens of things you can do to incrementally increase your website safe. Websites that do security will give you those details. Some even ask you to open up .htaccess files or wp-config.php files and re-write code. Re-write code! That's insane. If you don't...

read more

Protecting documents with remote teams

Assumption: You are a business owner and you have at least one remote staff. You'll want to think about and find a solution for your files at rest (where they are stored) and your files in transit (when they are sent to you). If you are having someone send you blog...

read more

Should a small business focus on internet security?

If you have a website that tells people what you do, but most of your business is word-of-mouth, then internet security can be a low priority. If you go door-to-door selling things to people, then internet security can be a low priority. If you don’t need to store...

read more

Backup Your Website

Whenever I setup a backup solution for a friend with a small website, I recommend Backup Buddy. It's quick and easy. This isn't a marketing post; there are other backup solutions that you can use. Find one that fits your effort, skill, and budget. This post is a quick...

read more

A Simple Step to Reducing Email Hacks

Stop using the 'Register with Google' buttons. You might want to stop using the 'Register with Facebook' buttons as well, depending on how valuable you find Facebook. If you stop using those, you are putting in place a simple strategy for reducing the chance of your...

read more

Ransomeware: Please know what this is all about

This post is actually a link to the US-CERT. A CERT is a Computer Emergency Readiness Team. Companies and governments lift CERTs to be able to deal with computer attacks and incidents. Part of their role is to identify and report vulnerabilities. There is an...

read more

Budgets, Sales, and Security

  Bait and switch. There is a lot more bait and switch in security than you’d expect. I can call it the silver bullet problem. Companies like Norse show up and claim to have solved our problems. It’s like Napoleon Dynamite’s speech during his presidential debate....

read more

CTF as Training for Bug Bounty

From 16/07/2016 until 14/08/2016 I will be participating in the Palo Alto CTF. I doubt any money will be won by yours truly, but I do not doubt I will learn an absolute ton. Several colleagues are quite leet, and I’m sure they will sort most of this out themselves....

read more

What is malware?

Big bad scary malware. How do you explain malware to people who are not really into security? Let’s try. I will use simple analogies and language, yet will still try to go into some detail, so you can help people you know and love (and work for) understand the idea...

read more

Consider an apprenticeship in cyber security

Are you cut out of University? Writing this feels wrong. I have spent most of my life in formal schooling. I started elementary at 7 and stayed until I was 25. Then I spend an extra year when I was 30. I like school. I am good at it. I was definitely cut out of it. I...

read more

Moving from the bones to the brains

I'll call this a personal post. I generally hate personal posts, because they take too long to create, are a bit 'me-me-me', and aren't evergreen. That introduction to web hacking series I made is, hopefully, evergreen. Some of those opinion pieces are also evergreen....

read more

What do hackers look like?

This is fun. This is a fun piece that I'm writing to force myself back into the habit. Work is busy, as is your work, I am sure. If you are a newbie, then your study is busy. If it's not, you aren't trying hard enough or your life is busy and you don't have the time...

read more

IoT and Privacy

There is a lot to consider with IoT. A lot of cool security stuff doesn't focus on privacy or ethics or any of that. A lot of sexy security is all hackery smackery. But in organisations and governments, most of the security team is doing back-end, boring security....

read more

How to install WordPress on Kali Linux

Wordpress is one of the most commonly used content management systems in the world. If you run your own website or blog, chances are high that you run Wordpress. Let's install Wordpress onto our local machine. Wordpress is a free content management system available at...

read more