Digital Paladin

Improving lives through technology!

Category: Cyber

  • Update

    Hi, Digital Paladin is taking a break from posting; please check back in 2026!

  • “When a Stranger Calls”

    “We’ve traced the call… it’s coming from inside the house.” Source: The 1979 Movie “When a Stranger Calls”. Sharing a couple of recent case studies on how sophisticated bad actors are systematically infiltrating the networks of target organisations. These case studies are just as scary as any horror movie. There has been recent press coverage…

  • Caveat Emptor

    “If it is too good to be true….it is probably a fraud!” Ron Weber. Sharing a couple of interesting topics from recent Risky Business podcasts:

  • Digital Maturity Framework – Risk

    “You have power over your mind – not outside events, realise this, and you will find strength” Source: The Meditations of Marcus Aurelius. Following on from our recent post on digital maturity and strategy alignment, we turn to Risk which is another key aspect of the Digital Paladin Maturity Model. The following four books are…

  • Good news, bad news!

    In recent news, Google have announced the rollout of passkey technology which should eliminate the need for passwords on Google Accounts.  As explained in a previous Digital Paladin post, this should significantly reduce or eliminate cyber risks associated with passwords such as phishing, easily guessed characters, and passwords being reused across multiple websites or apps.…

  • Reality Bytes Harder!

    “Comedy equals tragedy plus blockchain” Mark Twain misquote. Following on from Digital Paladin’s earlier Reality Bytes! post on crypto, it’s important to differentiate between frequent crypto-currency heists and the failure of get rich quick schemes (including the recent collapse of FTX) and the underlying potential of blockchain technology. The Freakonomics Radio podcast channel has a…

  • Are passwords finally dead?

    Digital Paladin views Apple Passkey as one of the most important features incorporated in iOS 16 and macOS Ventura, the latest releases of Apple’s operating systems for mobiles and computers. Apple Passkey is based on FIDO – Fast IDentity Online – a fast, secure and most importantly password-less authentication solution which utilises public-key (asymmetric) cryptography.…

  • Reality Bytes!

    “The possible cryptovariable space Allied cryptanalysts were typically faced with during the Second World War when attempting to read Enigma traffic is 107,458,687,327,250,619,360,000, which is approximately 10^23 … With such daunting odds facing any cryptanalyst, it is not surprising that the German cryptographers felt secure using the Enigma. The strength of the large numbers, numbers…

  • The Quiets Ones!

    Patrick Gray interviews Proofpoint’s EVP of Cybersecurity Strategy, Ryan Kalember in this edition of the Risky Biz Soap Box series titled: “While you’re watching a quiet one a noisy one will kill you”. A really informative interview in which Ryan explains why security spending could be better prioritised towards the three most likely threats of…

  • Observability of AI?

    It’s always useful to listen to the Risky Business podcast for their insights into the latest cyber issue du jour but this week’s podcast had an interesting discussion on the observability of artificial intelligence triggered by Elon Musk’s vow to “open-source” Twitter’s algorithms to promote transparency and free speech. This discussion starts at the 19:40…

  • Protect your ERP System!

    “The US Department of Homeland Security has issued multiple warnings against cyberattacks targeting ERP systems.” (from the McKinsey article “Seven steps to help protect your ERP system against cyberattacks” published March 24, 2022). McKinsey have published a timely article on the importance of hardening ERP systems against cyber-attack.  The article points out that ERP systems…

  • Anatomy of a Ransomware Attack

    The linked Risky Business podcast – “Everyone has a plan until they get punched in the face”  – features an interview with Michael Montoya, the CISO of Equinix. In September 2020, Equinix was subjected to a significant ransomware cyber-attack.  As the interviewer, Patrick Gray notes: it’s extremely rare for CISOs to talk about events like…

  • ICT Transformation Survey

    McKinsey’s latest IT survey has confirmed that the gap between top performing IT organisations and others has increased over the last 12 months.  73% of the top performers “now say that their most senior tech leaders (the chief information officer or chief technology officer) are highly involved in shaping the company-wide strategy and agenda” versus…

  • Know Your (Cyber) Enemy!

    “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu. Although Sun Tzu…