Tag: technology
-

AI Is Not A Rice Cooker: Kona Grit And The Best Security Language
AI is not a rice cooker, you can’t just set and forget it. I unpack the NIST Cyber AI Profile and its “Secure, Defend, Thwart” pillars, tracing the line between the lava fields of Kona and the endurance required for intelligent defence.
-

Pulp Friction: How Innovation Makes Us Vulnerable to Threats
An experienced martial arts coach told me that many people quit as soon as learning gets uncomfortable, but those who check their ego at the door and lean into a beginner’s mindset usually stay. In today’s world, where so much is designed to be frictionless and convenient, that willingness to accept a bit of friction…
-

I Know What You Did Last Summer: Hacks, Leaks, and Revelations
“A single leak can illuminate the machinery of oppression that thrives in darkness, offering the public a glimpse of truths carefully buried.” Early in 2024, I heard programmer and former infosec specialist and investigative journalist at The Intercept, Micah Lee, interviewed on the podcast Firewalls Don’t Stop Dragons. Lee was discussing his soon-to-be-released book, Hacks,…
-

Dial-Up Dreams: Connection and the Gift of Curiosity
—
by
Geocities, Hotmail, IRC, MySpace, AskJeeves, MSN, Internet Cafes, Limewire, Napster, eBay, Amazon – but mostly books, ‘Kewl’ not ‘cool’ A/S/L? AOL and AIM, and manually having to type ‘www’ in front of every address – does anything on this list conjure a memory for you? Maybe it’s the impending holiday season, or the looming new…
-

Round Three: Day Three
Round three began with a sense of urgency. Similar to round one, I knew I had to get to work. Unfourtunately, the once mythical adrenaline rush and subsequent dump was very much a reality…
-

Round Two: Day Two
I don’t remember much of round two. The adrenaline dump was real and my memory of what happened is scattered. Unlike my overflowing note book from CyberCon, I don’t have my scrawled GP-style handwriting to refer to. I have glimpses of memories, like backing my opponent up into the corner but being unable to will…
-

Round One: Day One
When I was preparing for my first boxing match, I received some excellent advice from a friend who had previously competed (and who, in doing so, inspired me to compete) ‘the rounds go SO quickly, don’t waste a second’ So, in training I worked judiciously to take full advantage of the limited time I had;…
-

Cybersecurity, Yoga, and the Thrill of the Hunt: My Journey Into the World of CTFs
If you had asked me a year ago what a CTF was, I could tell you it stands for ‘Capture the Flag’ and is a hacking competition. What I didn’t know a year ago was that there is not one flag, but many, and there is not one style of hack, but many. I’d been…
-

Breaking into Cybersecurity: A Woman’s Perspective
“But then suppose you stepped into one of those rooms,’ he said, ‘and discovered another room within it. And inside that room, another room still. Rooms within rooms within rooms. Isn’t that how it might be, trying to learn Josie’s heart? No matter how long you wandered through those rooms, wouldn’t there always be others…
