Tag: cybersecurity
-

AI Is Not A Rice Cooker: Kona Grit And The Best Security Language
AI is not a rice cooker, you can’t just set and forget it. I unpack the NIST Cyber AI Profile and its “Secure, Defend, Thwart” pillars, tracing the line between the lava fields of Kona and the endurance required for intelligent defence.
-

Mastering the Stance Switch: AI Strategy for Success
In 2026, being an AI leader isn’t just about speed, it’s about the ‘Stance Switch.’ Most organisations are stuck in an ‘offence-only’ position, leaving their strategic chin exposed to regulatory and ethical counter-punches. Discover why weaponising your agility through AI frameworks like ISO/IEC 42001 is the ultimate competitive advantage for the modern boardroom
-

Pulp Friction: How Innovation Makes Us Vulnerable to Threats
An experienced martial arts coach told me that many people quit as soon as learning gets uncomfortable, but those who check their ego at the door and lean into a beginner’s mindset usually stay. In today’s world, where so much is designed to be frictionless and convenient, that willingness to accept a bit of friction…
-

How to Navigate Cybersecurity as an Introvert
Network. Network. Network. And not the wired kind…. If that sentence strikes fear into you, then you too may identify as an introvert, and expend energy presenting as an extrovert – or perhaps, like me you have moments of extroversion. When I first stepped into the cybersecurity space to look around, one piece of advice…
-

Minority Report and Immovable Objects
Where I live, the weather has finally settled into an Autumn rhythm. Autumn brings blistering blue skies by day and chill, crystal-clear nights. Some days are grey and quiet, with overcast evenings delivering beautiful neon sunsets through the clouds. This is my favourite time of year. Autumn fills my chest with awe – there’s something…
-

Why the L-step could be your secret weapon
Regardless of the domain, I think the L-step is an important tool as it opens up new possibilities. You can leverage the L-step to literally circle and evade your opponent and it simultaneously provides an opportunity to take some breaths and see new vulnerabilities to exploit. It’s dynamic and fluid, and it feels nice to…
-

The Creative Connection: Jazz, Culture, and Cybersecurity
Yussef Dayes is a British drummer and composer, who makes music which moves me. He recently released a short documentary, Yussef Dayes In Japan (Film) 富士山. I’ve loved jazz since I was in my early teens. It began with Billie Holiday and expanded over the years. Something about the modern crop of jazz artists like…
-

I Know What You Did Last Summer: Hacks, Leaks, and Revelations
“A single leak can illuminate the machinery of oppression that thrives in darkness, offering the public a glimpse of truths carefully buried.” Early in 2024, I heard programmer and former infosec specialist and investigative journalist at The Intercept, Micah Lee, interviewed on the podcast Firewalls Don’t Stop Dragons. Lee was discussing his soon-to-be-released book, Hacks,…
-

Dial-Up Dreams: Connection and the Gift of Curiosity
—
by
Geocities, Hotmail, IRC, MySpace, AskJeeves, MSN, Internet Cafes, Limewire, Napster, eBay, Amazon – but mostly books, ‘Kewl’ not ‘cool’ A/S/L? AOL and AIM, and manually having to type ‘www’ in front of every address – does anything on this list conjure a memory for you? Maybe it’s the impending holiday season, or the looming new…
