My interview with Info Security on how hacking does not necessarily require a significant amount of technical expertise anymore as substantial help from readily accessible tools online.
-
How AI changed cyber security
My interview with the New Statesman on how Artificial Intelligence has a range of applications in cyber security, including network security, fraud detection, malware detection & user/machine behavioural analysis.
-
Pandemic underscores skill of supply chain management
My interview in the Irish Times on incorporating Internet of Things technology in the supply chain so you can track that an item was kept, end to end, at the required temperature, including in the vans delivering it.
-
New transformative 4th industrial revolution or industry 4.0 technologies enabling transition to smart factories
My interview with International Defence, Security & Technology (IDST) on how fog computing introduces more cybersecurity risks to devices and virtual machines and how addressing these threats will be crucial for wider scale adoption.
-
Surge in organised cybercrime prompting huge opportunity in cybersecurity sector
My interview with Rize ETF on how “hacking enterprises” even have “dedicated call centres” to assist victims of ransomware attacks they themselves carry out.
-
Santa Zoom Calls, Amazon covid profits and the rise of Bitcoin
My interview on BBC Radio Foyle about Zoom calls to Santa, Amazon profits from covid and the rise of Bitcoin.
-
Cybersecurity and the business: Aiming for alignment
My interview with Infosecurity Magazine on the need to include security by design (SbD) allowing organisations to formalize infrastructure design and automate security controls so one can build security into every part of the IT management process.
-
How to Secure the Most Vital Data Channel in Your Organization: File Transfers
My participation in an Info Security webinar with Brian Honan where we discuss how to secure vital file transfer channels and how important the security, integrity, availability of these workflows are to the greater operational functions of organizations.
-
Why is IoT security still such a problem?
My interview with ITPro on how we need a baseline of security compliance for IoT devices.
-
Effective cybersecurity is the cornerstone of modern hyperconnectivity
My interview with Business Reporter on how biometrics, authenticator apps and/or hardware tokens will play an increasingly important role in the future.

