(I've done voiceovers for friends in the past, but I'm not a pro - VoxXpress artists are the real deal and by all accounts a joy to work with. I know they are used by some of the world's top brands.)
- University of LeicesterCriminology, 2014 - presentMSc in Security and Risk Management
- King Henry VIII School, CoventryEconomics and English, 1964 - 1970
- University of LeedsEnglish and Religion, 1971 - 1974
- ESETSecurity Evangelist, 2011 - present
- NCSA, InfoSec Labs, Rainbow, ePrivacy Group, STSN/iBAHN, Monetate
FTC IoT privacy and security push points out D-Link router and webcam flaws
The US Federal Trade Commission has again acted on its serious concerns about data privacy and security in the Internet of Things (IoT). Thi
A quarter of a century of computer and network security research and wri...
Twenty-five years ago this month McGraw-Hill published a book I wrote about computer and network security. And the first thing I tell people
The Effective CISO Survey: A call for participation
Are you a CISO? Do you work for or with a CISO? If you answered yes to any of those questions, please consider taking the 12 minute survey I
Researching Mr. Robot, Elliot's world, and cybersecurity at Comic-Con
At Comic-Con 2016, ESET explores the "real" world of Mr. Robot, has a VR adventure, and looks for cybersecurity clues in Elliot's room.
20 years of CISSP, ELOFANTs and other cybersecurity acronyms
This article is about some things I don't know, and some other things that you might not know. For example, I don't know who was the first p
Windows 10 Security and Privacy: In-depth review and analysis
As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy pe
Is the federal government doing enough to catch and prosecute computer c...
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute compute
Network ELOFANTS and other insider threat insights from the DBIR and beyond
An ELOFANT is an "Employee Left Or Fired, Access Not Terminated" and these ghost account insiders can undermine your organization's informat
What the CISSP? 20 years as a Certified Information Systems Security Pro...
Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Inform
GDPR Day: countdown to a global privacy and security regimen?
Privacy and security fears - predictably - impact US online commerce
US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see t
Security Bulletin: Steps you should take to fix a Java SE security risk ...
Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.
Healthcare data breaches lead more patients to withhold information from...
New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the s
Hemochromatosis (excess iron) raises risk of heart arrhythmia, cirrhosis
Hemochromatosis (excess iron) raises the risk of heart arrhythmia and cirrhosis of the liver.
Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity ri
HFE testing: an open letter to the American College of Medical Genetics ...
The American College of Medical Genetics and Genomics (ACMG) wants to limit your access to your genes, like whether or not you carry the pot
Whistleblower claims cybersecurity firm hacked clients
A cybersecurity firm is accused of hacking into potential clients in order to extort potential customers, according to Engadget.