My interview with Hubi 4.0 on the importance of storing sensitive information with strong encryption and being careful in managing access keys to prevent intrusions.
-
A month in the life of a social engineer – part four
My interview with ITPro on how law firms are attractive targets to hackers because of the amount of money that flows through our client accounts and the volume of transactions.
-
Sinn Fein MLAs apologise for offensive historical tweets
My interview on BBC Newsline about social media third party scrappers which may unearth historic posts on sites like Twitter.
-
Data Protection Day – comment from IEEE expert
My opinion piece for Global Security Mag on the most prevalent risks at the moment, and how to best prevent.
-
Cybersecurity Predictions for 2022 (Part 2!)
My interview with TechRound on how the increased use of mobile devices can lead to new risks as users install potentially malware-infected software and expose data to external networks.
-
A month in the life of a social engineer – part three
My interview with IT Pro on how hackers navigate the exploitation phase and embark on betraying our trust.
-
IEEE shows Zero Trust protects post-pandemic industries
My Trending Tech Podcast interview on how Zero Trust Architecture can build stronger protection for businesses with remote and in-office staff.
-
A month in the life of a social engineer – part two
My interview with IT Pro on how social engineers plan their attacks – from identifying targets to exploitation.
-
UK – EU Mobile Roaming charges introduced by mobile operators
My interview on BBC Radio Foyle about Virgin Mobile and O2 phone users not facing roaming charges following announcements by other networks to reintroduce extra fees after Brexit.
-
A month in the life of a social engineer – part one
My interview with IT Pro on how social engineers plan their attacks – from identifying targets to exploitation.

