My interview on BBC Radio Foyle News about the chaos which has ensued since Elon Musk opened up verification for anyone who pays.
-
Elon Musk says $8 monthly fee for Twitter blue tick
My interview on BBC Radio Foyle about Elon Musk declaring Twitter will charge $8 (£7) monthly to Twitter users who want a blue tick by their name indicating a verified account.
-
Elon Musk completes Twitter takeover amid hate speech concerns
My interview on BBC Radio Foyle about the world’s richest man, Elon Musk, completing his $44bn acquisition of Twitter, amid warnings from politicians and campaigners that hate speech on the platform must be held in check.
-
Government offers £200,000 to evaluate device security
My interview with Global Security Magazine on how organisations need to ensure they deploy IoT devices with sufficient security policies in place, such as firewalls and intrusion detection & prevention systems.
-
Tackling the Scourge of Cryptocurrency Thefts
My participation in an Infosecurity magazine online summit podcast on various cryptocurrency scams.
-
How Can Financial Services Combat Cyber Crime?
My interview with MinuteHack on how financial services businesses are an enticing target for cyber criminals.
-
The dangers of historical social media posts
My interview on BBC Radio Ulster about the discovery of troublesome historical social media posts.
-
Ofgem issues warning over scam energy support messages
My interview with Energy Live News on how Phishing attacks remain a big problem as they are designed to be effective by targeting large numbers of people with energy bill-related claims.
-
Why Cybersecurity should be your TOP Priority!
My interview with the Gibraltar Association of Compliance Officers on how cybercrime units have roles typically found in large legitimate business such as partner networks, associates, resellers, and vendors.
-
A Comprehensive Guide to Building a Cybersecurity Strategy
My interview with Invensis on the importance of reviewing the protection of physical locations and employee access, data management, data retention, network security, enforcement and restoration procedures and of course all IoT equipment.