Blog Posts

In Praise of Constraints

In Praise of Constraints

Our digital lives allow for so much sprawl, we get lost, I get lost.

Read More
Effective Teaching and Learning Techniques for Security Education

Effective Teaching and Learning Techniques for Security Education

Security Education is Changing

Traditionally this function has focused on awareness and knowledge transfer, but that has begun to change, thankfully. Behavioural science and looking for more nuianced understanding has now become a normal part of the conversation. This article focuses on modern pedagogical practises that foster learning communities, critical thinking, collaboration, and real-world application of security concepts.

Read More
Pour out the Acronym Soup - Create Memorable Names

Pour out the Acronym Soup - Create Memorable Names

Pour out the Acronym Soup: Create Memorable Names

Wot Do U Call It? - Wiley

Read More
From Lighthouse to Loran - Navigating GCP Security Auditing Tools

From Lighthouse to Loran - Navigating GCP Security Auditing Tools

Recently, I embarked on a journey into Google Cloud Platform (GCP), having spent a lot of time with AWS and Azure in the past, I wanted to dive into GCP and learn more. This exploration, fuelled by completing the Google Cybersecurity Certificate, and checking out sadcloud by NCCGroup, and the Enterprise Foundations Blueprint, led me to look more into auditing in GCP.

Read More
Outcome Over Output - Measuring Change in Security Education

Outcome Over Output - Measuring Change in Security Education

“100% of employees completed the annual security awareness training 🥳”, “Yay, we are secure 🎊”… 🙃

Read More
Books... They Have Been Read!

Books... They Have Been Read!

I’m a collector

I have to admit something… I am a book collector. There you go, it’s true. I buy books and put them on the shelf and this becomes a shelf of shame that I walk past and the books taunt me as I walk past trying not to look too long.

Read More