As a manager or an employee, no matter what company you are in, I am sure you have experienced poor processes which are also not followed. People often go off and do their own thing – but why does this happen? I will explore why companies have poor process, also… Continue Reading Poor process, also not followed

At a recent Responsible AI conference, I was in a panel discussing the shortcomings of AI to understand the subtle social nuances of gender, race, and equality when providing a un-biased response. AI does not have a definitive list of rules around inclusivity to understand when bias and ethical balance… Continue Reading Is AI Autistic?

AI is exploding right now, with huge interest, investment, and reporting in the media of AI. However, the need for responsible AI is important to consider – but what does that actually mean? AI is like a junior colleague – it needs monitoring, reviewing, and help. AI is really good… Continue Reading The need for Responsible AI

Here is an interesting perspective to apply to your employees’ acceptance of AI in their work – consider AI is a junior work colleague that every employee has at their disposal. With the roll-out of new AI capabilities and agents, there is often push-back from employees who fear that their… Continue Reading AI is a junior colleague

AI is massive right now, and many businesses have had direction from their Board, CEO or other executives demanding that the business makes use of AI. Unfortunately, some are jumping in with two feet and not really planning their AI journey. So, the question remains, how to get started in… Continue Reading How to get started in AI

This article outlines a strategic roadmap for organisations beginning on their digital transformation journey. It walks through the key phases – assessment, goal setting, pilot testing, scaling and covering cultural change and compliance – offering insights into aligning technology adoption with long-term business objectives. It emphasises change management and stakeholder… Continue Reading Digital Transformation Roadmap: From Legacy to Innovation

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths are because the world has changed and the advice is no longer… Continue Reading Cybersecurity myths – never write down your password

In the past few months, I have been sharing my views about cybersecurity myths – some of them held by the public, and some myths are still held (and propagated) by cybersecurity professionals and companies. One that may have been true at one time, but is no longer the case,… Continue Reading Cybersecurity Myths – the perimeter is the protection

In my recent theme of breaking common cybersecurity myths, I have been revealing some commonly held beliefs that even cybersecurity professionals will stand by. Today, I will look at the “most common passwords” and challenge whether they really are as common as we are told. Most common passwords A quick… Continue Reading Cybersecurity Myths – people use bad passwords

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – I’m not a target

Creation of good policies and procedures is an art that can be helped with some core advice. Policies are the backbone of how a business tells their employees how to act and react, and ensures consistency and productivity. A great company culture, a consistent vision and values, and compliance with… Continue Reading Creating good policies and procedures

Yesterday, there was a world-wide incident that affected computers running CrowdStrike Falcon, where there was a conflict between the vendor’s anti-malware protection and the Windows sensor, resulting in a BSOD and unresponsive computers. This is a major incident that was effectively the effective impact as we were expecting from the… Continue Reading Lessons from the CrowdStrike incident

On International Women’s Day, I am reminded of the need for diversity in the workforce, and want to pose the question of what does diversity mean to you? Diversity is not just the inclusion of other races, genders and backgrounds. More than just a blind quota of non-white, non cisgender,… Continue Reading What does diversity mean to you?

Terminology around privacy and security often will use the term “PII” – to refer to “Personally Identifiable Information”. However, PII in Australia is not a valid term – the definition by the OAIC is “personal information”, and it differs from the US term (from NIST) and the legal obligations around… Continue Reading PII in Australia and personal information

The English journalist Louis Theroux has a reputation for interviewing “difficult” and unusual people and subcultures, and getting a large amount of information and knowledge from people who otherwise do not open up to outsiders. The techniques and patterns that he uses to get people to open up are methods… Continue Reading Get information the Louis Theroux way

What is your strategy for patching and updates? Whilst it might be tempting to just leave your systems on auto-update, the alternative to manually delay updates to always be one behind the latest (also known as an N-1 update strategy), may also be a problem. Updates and patching of software… Continue Reading N-1 update strategy

With the ever-increasing levels and frequency of attacks and impact, businesses of all sizes should consider specific cyber insurance. However there are some Cyber Insurance myths that need to be dispelled. Myth #1 – My other insurance will cover me Unless your other insurance specifically covers cyber events, you are… Continue Reading Cyber Insurance myths

The Australian Cyber Security Centre, working alongside the Australian Signals Directorate (formerly Defence Signals Directorate) created a list of eight essential mitigation strategies to act as a baseline for cybersecurity. These are very much basic and essential measures, and they are an absolute minimum. As a cybersecurity professional, these are… Continue Reading What is wrong with the Essential 8?