Blog

  • Image of a rice cooker with networking cables, lights and microchips in a muted golden colour on black. White 'Seeline Cyber' logo at the base, centered.

    AI Is Not A Rice Cooker: Kona Grit And The Best Security Language

    AI is not a rice cooker, you can’t just set and forget it. I unpack the NIST Cyber AI Profile and its “Secure, Defend, Thwart” pillars, tracing the line between the lava fields of Kona and the endurance required for intelligent defence.

  • Mastering the Stance Switch: AI Strategy for Success

    In 2026, being an AI leader isn’t just about speed, it’s about the ‘Stance Switch.’ Most organisations are stuck in an ‘offence-only’ position, leaving their strategic chin exposed to regulatory and ethical counter-punches. Discover why weaponising your agility through AI frameworks like ISO/IEC 42001 is the ultimate competitive advantage for the modern boardroom

  • Threats and Vulnerabilities: Go the Distance

    There’s a cliché which I’m sure even aliens have heard; ‘Life is a marathon, not a sprint’ I’d like to propose an alternative, life is, in fact an ultramarathon. Period. Allow me to explain. I recently completed another ultramarathon, my first at the 100 mile distance. On reflection, it was a micro-study into how I…

  • A series of neon lights are horizontally arrnaged. Starting from top in red, then white and a grey/blue and finally blue/green at the base. Photo by Maximalfocus via Unsplash

    Pulp Friction: How Innovation Makes Us Vulnerable to Threats

    An experienced martial arts coach told me that many people quit as soon as learning gets uncomfortable, but those who check their ego at the door and lean into a beginner’s mindset usually stay. In today’s world, where so much is designed to be frictionless and convenient, that willingness to accept a bit of friction…

  • How to Navigate Cybersecurity as an Introvert

    Network. Network. Network. And not the wired kind…. If that sentence strikes fear into you, then you too may identify as an introvert, and expend energy presenting as an extrovert – or perhaps, like me you have moments of extroversion. When I first stepped into the cybersecurity space to look around, one piece of advice…

  • Image shows an overhead view of a cup of espresso. On the left of screen is espresso in a half moon shape, followed by the white half circle of the inside of a cup and a bright blue half circle . On the right hand of frame there is some timber visible where the cup and saucer is resting on a table.

    The Synthesiser

    When I was a child, I was always drawn to exploring book shelves. I would open the pages of found books and move among the stories and histories – feeding my imagination with ideas both within and beyond my grasp. Snapshot captured, and stealthed away for future use. In time I might discard, adapt or…

  • Minority Report and Immovable Objects

    Where I live, the weather has finally settled into an Autumn rhythm. Autumn brings blistering blue skies by day and chill, crystal-clear nights. Some days are grey and quiet, with overcast evenings delivering beautiful neon sunsets through the clouds. This is my favourite time of year. Autumn fills my chest with awe – there’s something…

  • Why the L-step could be your secret weapon

    Regardless of the domain, I think the L-step is an important tool as it opens up new possibilities. You can leverage the L-step to literally circle and evade your opponent and it simultaneously provides an opportunity to take some breaths and see new vulnerabilities to exploit. It’s dynamic and fluid, and it feels nice to…

  • Yussef Dayes Live in Japan.

    The Creative Connection: Jazz, Culture, and Cybersecurity

    Yussef Dayes is a British drummer and composer, who makes music which moves me. He recently released a short documentary, Yussef Dayes In Japan (Film) 富士山. I’ve loved jazz since I was in my early teens. It began with Billie Holiday and expanded over the years. Something about the modern crop of jazz artists like…

  • Calm as a Closing Chapter

    In that time a few years ago, when everything was a little upside down and the Mr. and I could only go out for an hour at a time, couldn’t go into the pharmacy together, and had to wear masks everywhere—we discovered a yoga teacher named Travis Elliot. Well, I rediscovered him, as I had…

  • Neon lights, five in total appear to be on a black ceiling. They are in hues of (from left to right). yellow, pink, red, purple, blue. Photo by Adrien via unsplash.com

    I Know What You Did Last Summer: Hacks, Leaks, and Revelations

    “A single leak can illuminate the machinery of oppression that thrives in darkness, offering the public a glimpse of truths carefully buried.” Early in 2024, I heard programmer and former infosec specialist and investigative journalist at The Intercept, Micah Lee, interviewed on the podcast Firewalls Don’t Stop Dragons. Lee was discussing his soon-to-be-released book, Hacks,…

  • Dial-Up Dreams: Connection and the Gift of Curiosity

    Geocities, Hotmail, IRC, MySpace, AskJeeves, MSN, Internet Cafes, Limewire, Napster, eBay, Amazon – but mostly books, ‘Kewl’ not ‘cool’ A/S/L? AOL and AIM, and manually having to type ‘www’ in front of every address – does anything on this list conjure a memory for you? Maybe it’s the impending holiday season, or the looming new…

  • Image of Monstera leaf with water particles. Heatwave filter applied, gives it a purple hue. Original image by Georgia de Lotz via unsplash.com

    Australia’s Philly Shell Moment: Security Under Pressure

    The Philly Shell: a boxing technique with surprising lessons for cybersecurity. When applied poorly, the risks are clear. Are we ready to face the challenges?

  • Round Three: Day Three

    Round three began with a sense of urgency. Similar to round one, I knew I had to get to work. Unfourtunately, the once mythical adrenaline rush and subsequent dump was very much a reality…

  • Round Two: Day Two

    I don’t remember much of round two. The adrenaline dump was real and my memory of what happened is scattered. Unlike my overflowing note book from CyberCon, I don’t have my scrawled GP-style handwriting to refer to. I have glimpses of memories, like backing my opponent up into the corner but being unable to will…

  • Round One: Day One

    When I was preparing for my first boxing match, I received some excellent advice from a friend who had previously competed (and who, in doing so, inspired me to compete) ‘the rounds go SO quickly, don’t waste a second’ So, in training I worked judiciously to take full advantage of the limited time I had;…

  • The anticipatory rise

    “I discovered that when I believed my thoughts I suffered, but when I didn’t believe them I didn’t suffer, and that this is true for every human being. Freedom is as simple as that.” – Byron Katie, Author I’m officially days out from my very first boxing match. It’s a masters event, interstate, against an opponent…

  • Top 10 Frameworks in Boxing and Cybersecurity

    • Style Insight: The jab is the most important punch in boxing. The jab can close space, it can set up combinations, it can protect a fighter and keep them in the bout longer. Jabbing is an art of constant, precise, and strategic strikes intended to wear down an opponent over time. It’s about control,…

  • Corner Crew: How Community Spirit Shaped My WiCys CTF Challenge

    Earlier this month, my striking coach competed in his first boxing match. Though he’s primarily focused on MMA and other martial arts, he wanted to grow as an athlete and take on a new challenge. Despite preparing thoroughly, the night didn’t go as planned; he took heavy punishment, including knockdowns, compounded by a severe weight…

  • Becoming a blue belt in cybersecurity

    Recently, my BJJ coach promoted me to blue belt. BJJ, for the uninitiated is Brazillian Jiu Jitsu, a martial art originating in Japan (Jiu Jitsu) which was adopted by the Gracie family in Brazil and exported to the world. Like cybersecurity, I arrived at the BJJ game later in life – it took me a…

  • CTF OSINT, Half-Marathon PBs, and the Power of Micro-Adjustments

    Since early 2024, I’ve been part of a CTF team comprised of women in security. Led by experienced players who are dedicated to uplifting newbies in the industry and the world of CTF, the experience has been wonderful. I was drawn to OSINT challenges early on, as it felt like a good fit given my…

  • Managing Distance, Minimising Threats: Lessons from Martial Arts for Cybersecurity

    One of the most intriguing concepts I’ve discovered in cybersecurity so far is the ‘zero-day’ and one way I’ve been thinking about it (as I train for my first amateur boxing match) is in terms of punches and positioning tactics. Imagine an impactful punch in a boxing match, that despite doing so much preparation and…

  • WUDANG CLAN: Martial Arts Tactics AND Cyber Defense

    As I reflect on my passion for technology and martial arts, a recent read comes to mind – ‘The Girl From Wudang’ by P.J Caldas. This science-fiction dream state of a novel perfectly embodies the intersection of Eastern philosophy and 21st Century science. Often when I’m thinking about writing I’ll jot down many ideas, some…

  • Cybersecurity, Yoga, and the Thrill of the Hunt: My Journey Into the World of CTFs

    If you had asked me a year ago what a CTF was, I could tell you it stands for ‘Capture the Flag’ and is a hacking competition. What I didn’t know a year ago was that there is not one flag, but many, and there is not one style of hack, but many. I’d been…

  • Breaking into Cybersecurity: A Woman’s Perspective

    “But then suppose you stepped into one of those rooms,’ he said, ‘and discovered another room within it. And inside that room, another room still. Rooms within rooms within rooms. Isn’t that how it might be, trying to learn Josie’s heart? No matter how long you wandered through those rooms, wouldn’t there always be others…

Subscribe

Enter your email below to receive new post notifications.