Blog

Books… What’s on the Reading List?

Books… What’s on the Reading List?

Dropping some books I’m reading or maybe it’d be more accurate to say some books I’m finally reading. Most have been my shelf a while. I’ve been jumping in and out of each of these, sometimes picking up the actual book and sometimes a listen to the audiobook version but I’m enjoying each.

Read More
Your First Pull and Merge Request With a Sprinkle of Automation

Your First Pull and Merge Request With a Sprinkle of Automation

New to Git? I wrote a version of this out for myself a good while back when starting out, it helped me to keep track of these basic parts in order. I do enjoy letting full commands slip from my working memory all the time, so this kind of thing and writing your own can help.

Read More
My Kubernetes Learning track

My Kubernetes Learning track

My Kubernetes knowledge has been patchy at best for a long time. I remember getting into learning about K8s back in 2019 when reading some great internal articles at Duo in 2019; Jordan Wright’s “Kubernetes is Bad” and Jeremy Erikson’s “Kubernetes is LESS bad”. These were great and had a whole bunch of detail, though at the time I was only really having a look at Kubernetes from a distance and didn’t get too hands-on like I usually would with something new that interests me.

Read More
In Praise of Constraints

In Praise of Constraints

Our digital lives allow for so much sprawl, we get lost, I get lost.

Read More
Effective Teaching and Learning Techniques for Security Education

Effective Teaching and Learning Techniques for Security Education

Security Education is Changing

Traditionally this function has focused on awareness and knowledge transfer, but that has begun to change, thankfully. Behavioural science and looking for more nuianced understanding has now become a normal part of the conversation. This article focuses on modern pedagogical practises that foster learning communities, critical thinking, collaboration, and real-world application of security concepts.

Read More
Pour out the Acronym Soup - Create Memorable Names

Pour out the Acronym Soup - Create Memorable Names

Wot Do U Call It? - Wiley

The security industry and naming things…

The challenges when it comes to naming anything is nothing new, it’s hard and not to be underestimated.

Read More
From Lighthouse to Loran - Navigating GCP Security Auditing Tools

From Lighthouse to Loran - Navigating GCP Security Auditing Tools

Recently, I embarked on a journey into Google Cloud Platform (GCP), having spent a lot of time with AWS and Azure in the past, I wanted to dive into GCP and learn more. This exploration, fuelled by completing the Google Cybersecurity Certificate, and checking out sadcloud by NCCGroup, and the Enterprise Foundations Blueprint, led me to look more into auditing in GCP.

Read More
Outcome Over Output - Measuring Change in Security Education

Outcome Over Output - Measuring Change in Security Education

“100% of employees completed the annual security awareness training 🥳”, “Yay, we are secure 🎊”… 🙃

Read More
Oh! Am I Redundant?

Oh! Am I Redundant?

Alright, let’s start with the fact that it’s now Autumn, and the Acer Maple trees on my balcony look amazing!

Read More