Let’s take a second to understand what diversity truly means: I am white, female, I have been raped, I have been stalked, I have been abused, I am a survivor of domestic abuse and yet - I can in no way speak for all of the survivors of domestic abuse. I am but one stor...

April 23, 2018

"What is the perfect product?" "How do can you be completely secure?" "What website can I go to, that will give me information on the exact solution?"

March 11, 2018

This is part 2 of the Splunk Enterprise Fundamentals: Standalone Deployment, if you haven't ready Part 1 see here

Step 5: Configure Splunk 

If you've installed a desktop version of Linux on your Splunk server, enter localhost:8000. I have to make it easier for anyone a...

March 11, 2018

In the first and second edition of Splunk Fundamentals, we covered the different pieces of hardware and how data retention works. In this edition, we will be looking at the most basic of deployments, Standalone.

In an organisation you will more likely use a distributed...

February 18, 2018

Whilst highly documented, Splunk is complex and can lead to confusion on where to start. This series is a starting point supported by official documentation.

February 6, 2018

Last November I had the privilege to speak at The Times Tech Summit, on the Security & Trust panel. The first question asked "Can you have a safe internet?"

February 2, 2018

Whilst the internet allows us to travel the world from our desk, interestingly some global trends stick to specific geolocations.  If you monitor Phishing trends for even just a short 12 months, you'll soon realise not only does the frequency of emails increase dependi...

December 4, 2017

Good news everyone! I have  recently decided to join the most brilliant of companies, Baringa Partners.

Now you may be asking yourself why in the world is Baringa, a specialist management consultancy, doing hiring an Ethical Hacker? Let's be honest, it's not the first p...

June 21, 2017

As your career goes on, you may find yourself traveling down different routes than you originally planned. This article is a follow-up, designed to give an idea of what cyber security has become for me after I transitioned to it from networking.

Please reload

Recent Posts

October 29, 2019

Please reload

Archive

Please reload

Tags