I recently was asked by Bloomberg to comment on the raft of Android malware recently discovered. During that interview I mentioned some concepts around the open vs closed models and wanted to expand on this thinking a little further. Continue reading “Open for Business?”
It seems that since vendors started bringing out bug bounties, for all the right reasons I might add, a new breed of “security researcher” has appeared. This new type of researcher is single minded in his/her task and has a simple, no effort, no thought way of achieiving it “fuzzing!” Continue reading “Original Thought”
There is often a lot of talk about this concept, specifically in the white hat vs black hat debate that has gone on for what seems like forever now. I have, as you would expect, my own take on this. Lets start with a history lesson and the basics. White Hats are the “good guys” and Black Hats are the “bad guys”, why? because back in the good old days of spaghetti westerns, good guys always wore White Hats and the bad guys wore Black Hats, it’s that simple! Of course, in the scripted world of the western, it was that simple, the bad guy was that easy to spot and the good guys rode off into the sunset, but back in the real world it’s a little more difficult to identify.
I am getting a little annoyed with hearing people wax lyrical about “the cloud” and how its going to revolutionise the world. I have a news flash for you all, its not new and its not revolutionary! Continue reading “Cloud Computing”
Personally, I think this is one of the most important concepts of today. Its simple enough to grasp and illustrates the point very well. Continue reading “The Asymmetry of Security”
People often ask me whats the best way to get into security as a career. There are of course many views on this subject, but I don’t believe there is a clear answer. So rather than try and map out a path, lets look at some of the elements involved and some options.