My interview in the Irish Times on incorporating Internet of Things technology in the supply chain so you can track that an item was kept, end to end, at the required temperature, including in the vans delivering it.
-
New transformative 4th industrial revolution or industry 4.0 technologies enabling transition to smart factories
My interview with International Defence, Security & Technology (IDST) on how fog computing introduces more cybersecurity risks to devices and virtual machines and how addressing these threats will be crucial for wider scale adoption.
-
Surge in organised cybercrime prompting huge opportunity in cybersecurity sector
My interview with Rize ETF on how “hacking enterprises” even have “dedicated call centres” to assist victims of ransomware attacks they themselves carry out.
-
Santa Zoom Calls, Amazon covid profits and the rise of Bitcoin
My interview on BBC Radio Foyle about Zoom calls to Santa, Amazon profits from covid and the rise of Bitcoin.
-
Cybersecurity and the business: Aiming for alignment
My interview with Infosecurity Magazine on the need to include security by design (SbD) allowing organisations to formalize infrastructure design and automate security controls so one can build security into every part of the IT management process.
-
How to Secure the Most Vital Data Channel in Your Organization: File Transfers
My participation in an Info Security webinar with Brian Honan where we discuss how to secure vital file transfer channels and how important the security, integrity, availability of these workflows are to the greater operational functions of organizations.
-
Why is IoT security still such a problem?
My interview with ITPro on how we need a baseline of security compliance for IoT devices.
-
Effective cybersecurity is the cornerstone of modern hyperconnectivity
My interview with Business Reporter on how biometrics, authenticator apps and/or hardware tokens will play an increasingly important role in the future.
-
Why securing the DNS layer is crucial to fight cyber crime
My interview with Computer Weekly on DNS over TLS (DoT) & DNS over HTTPS (DoH) which encrypt plaintext DNS traffic to prevent third parties from intercepting DNS requests.
-
A Comprehensive Guide to Building a Cybersecurity Strategy
My interview with Invensis on how organizations must enforce their compliance protocols and perform routine audits of all linked equipment and safety risks even physical ones.