So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.

So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.

Organizations struggle to balance usability and security in digital environments, often facing a "pendulum effect" where stringent security frustrates users, leading them to ignore rules. This creates vulnerabilities. The solution lies in user-centered design, continuous feedback, and cultivating a security-conscious culture to enhance both security and usability effectively.

Socio-Technical Cybersecurity – The Human Clusterfuck in Cybersecurity and why Your Firewall Won’t Save You When Karen Clicks a Phishing Link

The Human Clusterfuck in Cybersecurity: Why Your Firewall Won’t Save You When Karen Clicks a Phishing Link

Cybersecurity hinges more on human behavior than technology, with 82% of breaches resulting from human error. Effective frameworks like NIST and ISO 27001 require organizations to foster a security-focused culture. Training is crucial to reducing risks, as demonstrated by successful interventions in companies like British Airways and Google.

China’s Drone Warfare Advances: A Bloody Game-Changer for Global Security

China’s Drone Warfare Advances: A Bloody Game-Changer for Global Security

China's rapid advancements in drone technology are reshaping global security dynamics. With AI integration and market dominance, China's military drone capabilities threaten Western powers. Their strategic use of drones in conflict and control over the global supply chain raises significant geopolitical concerns, prompting adaptations in defense and military doctrine worldwide.

Killer Robots & Head Shrinks: The Real Psychological Shitshow of AI Drone Warfare

Killer Robots & Head Shrinks: The Real Psychological Shitshow of AI Drone Warfare

Military AI drones are changing warfare and creating a psychological minefield. This blog post dives into the psychological impact of drone warfare on soldiers and civilians, revealing PTSD, anxiety, moral injury, and community trauma. Explore the ethical implications of AI making life-or-death calls and the urgent need for more research and support systems.

Application security is not necessarily necessary

Application security is not necessarily necessary

Often times applications have reached end-of-life, or are no longer supported by the vendor. In this case organizations tend to weed out or replace such applications simply due to this fact. I was confronted with this organization while performing a due diligence for an investment company. The course after of the organization in question was … Continue reading Application security is not necessarily necessary

Your email server should ensure encrypted communication and messaging only

Your email server should ensure encrypted communication and messaging only

As you can see this post was published in 2019. We’ve had pretty much everything about you go south. Probably the most revealing thing, and the only one in years that led to some kind of reaction, where the Snowden revelations. No, one of the main issues is that even after such a major incident, … Continue reading Your email server should ensure encrypted communication and messaging only

Is your cloud service provider contactable in case of crisis?

Is your cloud service provider contactable in case of crisis?

Probably one of the most interesting questions to ask when reviewing a cyber crisis reaction document is the phone number of the cloud hosting platform that is chosen to be the one to store the back ups of all critical systems of an organization. Chances are that the survival of your company relies on this … Continue reading Is your cloud service provider contactable in case of crisis?

Why you need on-location and co-location backups and why they should be encrypted

Why you need on-location and co-location backups and why they should be encrypted

I hope I will be stating the obvious in this post; but I have seen so many things going wrong that I will risk repeating myself! On location back ups are totally cool! They are directly connected to your ethernet, have blazing accessibility rate, superb file transfer speeds, and a variety of other bills and … Continue reading Why you need on-location and co-location backups and why they should be encrypted

Project: Advanced Cybersecurity Risk Assessment Checklist

What is the "Advanced Cybersecurity Risk Assessment Checklist" (ACRAC)?ACRAC allows any organisation to assess a status quo of their cybersecurity. It's a thorough, and constantly updated checklist to reduce common cyber threats organisations are confronted with. Its goal is to raise awareness for vulnerabilities, thereby neutralising a majority of threat vectors an organisation sees itself … Continue reading Project: Advanced Cybersecurity Risk Assessment Checklist