-

AI Is Not A Rice Cooker: Kona Grit And The Best Security Language
AI is not a rice cooker, you can’t just set and forget it. I unpack the NIST Cyber AI Profile and its “Secure, Defend, Thwart” pillars, tracing the line between the lava fields of Kona and the endurance required for intelligent defence.
-

Mastering the Stance Switch: AI Strategy for Success
In 2026, being an AI leader isn’t just about speed, it’s about the ‘Stance Switch.’ Most organisations are stuck in an ‘offence-only’ position, leaving their strategic chin exposed to regulatory and ethical counter-punches. Discover why weaponising your agility through AI frameworks like ISO/IEC 42001 is the ultimate competitive advantage for the modern boardroom
-

Threats and Vulnerabilities: Go the Distance
There’s a cliché which I’m sure even aliens have heard; ‘Life is a marathon, not a sprint’ I’d like to propose an alternative, life is, in fact an ultramarathon. Period. Allow me to explain. I recently completed another ultramarathon, my first at the 100 mile distance. On reflection, it was a micro-study into how I…
-

Pulp Friction: How Innovation Makes Us Vulnerable to Threats
An experienced martial arts coach told me that many people quit as soon as learning gets uncomfortable, but those who check their ego at the door and lean into a beginner’s mindset usually stay. In today’s world, where so much is designed to be frictionless and convenient, that willingness to accept a bit of friction…
-

How to Navigate Cybersecurity as an Introvert
Network. Network. Network. And not the wired kind…. If that sentence strikes fear into you, then you too may identify as an introvert, and expend energy presenting as an extrovert – or perhaps, like me you have moments of extroversion. When I first stepped into the cybersecurity space to look around, one piece of advice…
-

The Synthesiser
When I was a child, I was always drawn to exploring book shelves. I would open the pages of found books and move among the stories and histories – feeding my imagination with ideas both within and beyond my grasp. Snapshot captured, and stealthed away for future use. In time I might discard, adapt or…
-

Minority Report and Immovable Objects
Where I live, the weather has finally settled into an Autumn rhythm. Autumn brings blistering blue skies by day and chill, crystal-clear nights. Some days are grey and quiet, with overcast evenings delivering beautiful neon sunsets through the clouds. This is my favourite time of year. Autumn fills my chest with awe – there’s something…
-

Why the L-step could be your secret weapon
Regardless of the domain, I think the L-step is an important tool as it opens up new possibilities. You can leverage the L-step to literally circle and evade your opponent and it simultaneously provides an opportunity to take some breaths and see new vulnerabilities to exploit. It’s dynamic and fluid, and it feels nice to…
-

The Creative Connection: Jazz, Culture, and Cybersecurity
Yussef Dayes is a British drummer and composer, who makes music which moves me. He recently released a short documentary, Yussef Dayes In Japan (Film) 富士山. I’ve loved jazz since I was in my early teens. It began with Billie Holiday and expanded over the years. Something about the modern crop of jazz artists like…
-

I Know What You Did Last Summer: Hacks, Leaks, and Revelations
“A single leak can illuminate the machinery of oppression that thrives in darkness, offering the public a glimpse of truths carefully buried.” Early in 2024, I heard programmer and former infosec specialist and investigative journalist at The Intercept, Micah Lee, interviewed on the podcast Firewalls Don’t Stop Dragons. Lee was discussing his soon-to-be-released book, Hacks,…
-

Dial-Up Dreams: Connection and the Gift of Curiosity
Geocities, Hotmail, IRC, MySpace, AskJeeves, MSN, Internet Cafes, Limewire, Napster, eBay, Amazon – but mostly books, ‘Kewl’ not ‘cool’ A/S/L? AOL and AIM, and manually having to type ‘www’ in front of every address – does anything on this list conjure a memory for you? Maybe it’s the impending holiday season, or the looming new…
-

Round Three: Day Three
Round three began with a sense of urgency. Similar to round one, I knew I had to get to work. Unfourtunately, the once mythical adrenaline rush and subsequent dump was very much a reality…
-

Round Two: Day Two
I don’t remember much of round two. The adrenaline dump was real and my memory of what happened is scattered. Unlike my overflowing note book from CyberCon, I don’t have my scrawled GP-style handwriting to refer to. I have glimpses of memories, like backing my opponent up into the corner but being unable to will…
-

Round One: Day One
When I was preparing for my first boxing match, I received some excellent advice from a friend who had previously competed (and who, in doing so, inspired me to compete) ‘the rounds go SO quickly, don’t waste a second’ So, in training I worked judiciously to take full advantage of the limited time I had;…
-

The anticipatory rise
“I discovered that when I believed my thoughts I suffered, but when I didn’t believe them I didn’t suffer, and that this is true for every human being. Freedom is as simple as that.” – Byron Katie, Author I’m officially days out from my very first boxing match. It’s a masters event, interstate, against an opponent…
-

Top 10 Frameworks in Boxing and Cybersecurity
• Style Insight: The jab is the most important punch in boxing. The jab can close space, it can set up combinations, it can protect a fighter and keep them in the bout longer. Jabbing is an art of constant, precise, and strategic strikes intended to wear down an opponent over time. It’s about control,…
-

Corner Crew: How Community Spirit Shaped My WiCys CTF Challenge
Earlier this month, my striking coach competed in his first boxing match. Though he’s primarily focused on MMA and other martial arts, he wanted to grow as an athlete and take on a new challenge. Despite preparing thoroughly, the night didn’t go as planned; he took heavy punishment, including knockdowns, compounded by a severe weight…
-

Becoming a blue belt in cybersecurity
Recently, my BJJ coach promoted me to blue belt. BJJ, for the uninitiated is Brazillian Jiu Jitsu, a martial art originating in Japan (Jiu Jitsu) which was adopted by the Gracie family in Brazil and exported to the world. Like cybersecurity, I arrived at the BJJ game later in life – it took me a…
-

CTF OSINT, Half-Marathon PBs, and the Power of Micro-Adjustments
Since early 2024, I’ve been part of a CTF team comprised of women in security. Led by experienced players who are dedicated to uplifting newbies in the industry and the world of CTF, the experience has been wonderful. I was drawn to OSINT challenges early on, as it felt like a good fit given my…
-

Managing Distance, Minimising Threats: Lessons from Martial Arts for Cybersecurity
One of the most intriguing concepts I’ve discovered in cybersecurity so far is the ‘zero-day’ and one way I’ve been thinking about it (as I train for my first amateur boxing match) is in terms of punches and positioning tactics. Imagine an impactful punch in a boxing match, that despite doing so much preparation and…
-

WUDANG CLAN: Martial Arts Tactics AND Cyber Defense
As I reflect on my passion for technology and martial arts, a recent read comes to mind – ‘The Girl From Wudang’ by P.J Caldas. This science-fiction dream state of a novel perfectly embodies the intersection of Eastern philosophy and 21st Century science. Often when I’m thinking about writing I’ll jot down many ideas, some…
-

Cybersecurity, Yoga, and the Thrill of the Hunt: My Journey Into the World of CTFs
If you had asked me a year ago what a CTF was, I could tell you it stands for ‘Capture the Flag’ and is a hacking competition. What I didn’t know a year ago was that there is not one flag, but many, and there is not one style of hack, but many. I’d been…
-

Breaking into Cybersecurity: A Woman’s Perspective
“But then suppose you stepped into one of those rooms,’ he said, ‘and discovered another room within it. And inside that room, another room still. Rooms within rooms within rooms. Isn’t that how it might be, trying to learn Josie’s heart? No matter how long you wandered through those rooms, wouldn’t there always be others…
Subscribe
Enter your email below to receive new post notifications.

