My interview with Connected World where I predict that the most impactful 2023 development is likely to revolve around privacy-preserving technologies.
Ransomware: Why do businesses still pay up?
My interview with IT Pro on businesses infected with ransomware still frequently paying up.
‘Weaponised app’: Is Egypt spying on COP27 delegates’ phones?
My interview with Aljazeera on concerns raised at the United Nations’ COP27 climate talks over an official smartphone app that reportedly has carte blanche to monitor locations, private conversations and photographs.
Fake NI secretary email prompting Elon Musk tweet was sent due to ‘archaic’ system
My interview with Belfast Live on how Secretary of State Chris Heaton-Harris had to deny he had resigned after a sham statement was emailed to the press on the Northern Ireland Office (NIO) circulation list.
Twitter tales: What next after Elon Musk’s firing spree left 20% staff in India
My interview with the Economic Times alongside former Twitter India head Manish Maheshwari on the possible future of the microblogging platform.
The Economic Times is the second largest Daily Business Newspaper in the world after Wall Street Journal.
Elon Musk does not know what he is doing says former Twitter executive
My interview on BBC Radio Foyle News about the chaos which has ensued since Elon Musk opened up verification for anyone who pays.
Elon Musk says $8 monthly fee for Twitter blue tick
My interview on BBC Radio Foyle about Elon Musk declaring Twitter will charge $8 (£7) monthly to Twitter users who want a blue tick by their name indicating a verified account.
Elon Musk completes Twitter takeover amid hate speech concerns
My interview on BBC Radio Foyle about the world’s richest man, Elon Musk, completing his $44bn acquisition of Twitter, amid warnings from politicians and campaigners that hate speech on the platform must be held in check.
Government offers £200,000 to evaluate device security
My interview with Global Security Magazine on how organisations need to ensure they deploy IoT devices with sufficient security policies in place, such as firewalls and intrusion detection & prevention systems.
Tackling the Scourge of Cryptocurrency Thefts
My participation in an Infosecurity magazine online summit podcast on various cryptocurrency scams.