My interview on BBC Radio Foyle about the merits of creating a social media account for a child such as Khloe Kardashian did on Instagram.
-
Prime suspect in ‘big bitcoin heist’ escapes Iceland prison and flees on plane with country’s prime minister
My interview in the Independent about the risk of losing cryptocurrencies with little recourse to recovery.
-
Wetherspoons tells followers that it is quitting social media.
My interview on BBC Radio Foyle about pub chain Wetherspoon quitting social media due to concerns regarding the “trolling of MPs”, “misuse of personal data” and “the addictive nature of social media”.
-
Is the VR Universe in Ready Player One Possible?
My interview in Gizmodo on whether we could support a world wide Virtual Reality world as shown in the movie Ready Player One.
-
IEEE Transmitter Vital Cybersecurity Skills: Networking and Cryptography.
My interview with IEEE Transmitter on vital cybersecurity skills: Networking and Cryptography.
The interviewer was Stephen Cass, IEEE Spectrum Senior Editor.
-
IEEE Transmitter Cat and Mouse, Email Phishing and Machine Learning
My interview with IEEE Transmitter on cyber security aspects like email phishing and the role of machine learning in securing systems.
The interviewer was Stephen Cass, IEEE Spectrum Senior Editor.
-
Amazon patents ‘voice-sniffing’ algorithms
My interview on BBC Radio Foyle about Amazon’s patent which describes an algorithm that can listen to entire conversations, using “trigger words”, such as like and love, to build a profile of customers. It could then offer “targeted ads”.
-
Can Blockchain secure the Internet of Things?
My interview in BDaily News on the potential of blockchain to be used to secure IoT devices.
-
Mark Zuckerberg’s Congress Testimony day 1
My interview on BBC Radio Foyle about Mark Zuckerberg testimony before congress for the worst privacy debacle in his company’s history.
-
Why AI Could Be Cybersecurity’s Next Big Thing
My interview in CXO Today on the need for more sophisticated techniques such as machine learning to discover lurking cyber intrusion techniques.