Seven types of cyber criminals: 2024 version
Blog by Stuart Coulson regarding the Seven Types of Cyber Criminal. This is the 2024 and has a new entrant of AI-Enabled Criminals.
Categories:
Tags:
Criminal Hackers
Are all Hackers Criminal Hackers? Are there good and bad Hackers and what is the difference between a Hacker and Criminal?
Categories:
Tags:
CV Tips for people looking for their next role
CV Tips for Technical & Non-technical People to help you land your next role. These tips are from someone who has hired people as well as using them themselves.
Categories:
Tags:
Press Announcement : New Cyber Product Grading System Announced
We are proposing, rather sarcastically, that we use a grading system that has an origin story rooted in the term “Military Grade” and use that to create a benchmark for products and services that companies can use to give their customers faith in their services.
Categories:
Tags:
Response to Hypopara UK
Before we start this post … please click this link, go on … I said please ! http://www.hypopara.org.uk/ In 2013, it was one of those mornings when I hadn’t slept well and I was browsing Twitter. I came across a post from yet another criminal posting out how he had hacked a hospital and stolen
Categories:
Tags:
Intel SecChat
I was invited by @IntelSec_Biz to join their twitter conversation called SecChat. It lasts about an hour and a set of questions are posed for us to answer. It is usually a diverse audience and the discussion is usually very good. To help me manage this I enlisted 2 computers and four screens. Windows 1 Twitter
Categories:
Tags:
2016 Conferences and Events
Here are a list of the conferences I am hoping to attend in 2016. I will try and keep this table updated if I can with other events too. Let me know on Twitter if you are going to be at any of the events. [table id=3 /] But you missed my event ! Send
Talk Talk – a lesson learned for us all
Once Talk Talk was breached not only were the authorities and technical teams going into battle, but so was the PR machine. 7am in the morning the CEO is on as many news outlets as possible telling everyone that they had been breached. The details were still sketchy which is to be expected when they
Categories:
Tags:
The Talk Talk Breach
We are waking up in the UK to news that Talk Talk, the telecoms provider, has sustained a “persistent attack” on Wednesday 21st October 2015. The details the CEO has disclosed about the attack are as follows (Source LINK): Attack happened in the morning. Web servers were taken down by lunchtime. Met Police and security advisers were
Categories:
Tags:
Security Research Done Badly
On the face of it, demonstrating an exploit in an automotive system and finding a 0-day in a consumer piece of software and exploiting it are two completely different things, one is a criminal act and one is security research. But equally, there is also a similarity between attacks and “security research” when that research is done badly.
Categories:
Tags:
Conference Survival Guide
Do you go to many conferences ? Class yourself as a professional conference attendee? Here are my tips for attending a conference and how to ‘survive’ ! Before you get there Plan in advance, who you want to see, seminars, meet ups seminars etc. If there is an app for the show, it might be
Categories:
Tags:
Passwords, the good, the bad and the interesting ones !
It’s currently Get Safe Online week and so I thought I’d do a quick post on passwords. I’ve been using the internet for decade(s) now and it is amazing that I can remember most of my passwords – but that is a bad thing – it probably means I haven’t changed it enough. The only
Categories:
Tags:
Want your content writing?
We are available to create content or ideate.







