Blog Posts
- Home /
- Blog Posts
In Praise of Constraints
Our digital lives allow for so much sprawl, we get lost, I get lost.
Read More
Effective Teaching and Learning Techniques for Security Education
Security Education is Changing
Traditionally this function has focused on awareness and knowledge transfer, but that has begun to change, thankfully. Behavioural science and looking for more nuianced understanding has now become a normal part of the conversation. This article focuses on modern pedagogical practises that foster learning communities, critical thinking, collaboration, and real-world application of security concepts.
Read MorePour out the Acronym Soup - Create Memorable Names
Pour out the Acronym Soup: Create Memorable Names
Wot Do U Call It? - Wiley
Read More
From Lighthouse to Loran - Navigating GCP Security Auditing Tools
Recently, I embarked on a journey into Google Cloud Platform (GCP), having spent a lot of time with AWS and Azure in the past, I wanted to dive into GCP and learn more. This exploration, fuelled by completing the Google Cybersecurity Certificate, and checking out sadcloud by NCCGroup, and the Enterprise Foundations Blueprint, led me to look more into auditing in GCP.
Read MoreOutcome Over Output - Measuring Change in Security Education
“100% of employees completed the annual security awareness training 🥳”, “Yay, we are secure 🎊”… 🙃
Read MoreBooks... They Have Been Read!
I’m a collector
I have to admit something… I am a book collector. There you go, it’s true. I buy books and put them on the shelf and this becomes a shelf of shame that I walk past and the books taunt me as I walk past trying not to look too long.
Read More