In the summer of 1980, Abby Conant, a trombone player, applied to 11 open positions across orchestras in Europe. A trombone is a musical instrument which is a wind instrument, similar to a trumpet. It requires a huge amount of lung power and has historically been...
A circus is a highly structured and well-orchestrated operation, where everyone has a specific and defined role for which they are trained. In my opinion, the security industry can learn from this… If you ask ten information security analysts what they do, you...
Research conducted by KnowBe4[1] found that one out of three people is likely to click on a suspicious link or comply with a fraudulent request. For this reason, phishing remains a valid concern for organisations. The primary objective of phishing is to get someone to...
If learning is the objective, you can find most things on the internet for free (or very cheap). You can even purchase official certification study material and learn from that. When you embark on a certification journey, it is either because you need it for...
Log management is an important and foundational aspect of security; however, it is often overlooked. It is common to view security logging and monitoring as one function—that is, logging-and-monitoring. It is easy to lose sight of the fact that security logging is...
I’ve come to the cross-road where I’ve seen that at point where have all skill and no Certs you can’t…