Latest Posts

The illusion of MFA

The illusion of MFA

MFA has one weakness that puts every user at risk.

The core of authentication relies on checking three possible traits of a person:

Post Thumbnail

The Commoditization of Penetration Testing

Pentesting now seems like a dirty word.

This struck me when I was reading Open AI’s recent post “Advancing red teaming …

Post Thumbnail

How to Manage Third-Party Device Security?

I’m glad to see the first stand-alone cyber security legislation passing in to law today in Australia. The regulations …

Post Thumbnail

AI Attack Bots Are Coming

The opening scene from Terminator 2 takes place on July 11, 2029. It’s eerily close to when I expect several …

Post Thumbnail

MITRE ATT&CK Blind Spots

There is one area of information security that is conspicuously absent from ATT&CK.

If your tooling only applies the …

Post Thumbnail

What Is an Attack Library?

At it’s core, an Attack Library is a list of all possible attacks against a component of your design. We use it almost …

Post Thumbnail

Who Is Responsible for Security?

Everyone? I’m not so sure…

Imagine the early 2000s… Britney Spears is playing on the radio, the …