Archives for April, 2008
As promised in my previous post, I have just uploaded Cracking into embedded devices and beyond, Adrian Pastor’s presentation at ‘Hack in The Box’ Dubai 2008. Thanks Adrian for your promptly response when asked for the slides and congratulations for your excellent contribution to the security community. Hope we can share a pint next time I’m […]
It’s Sunday evening and I have spent the last hour going through the slides of Cesar Cerrudo’s talk at HiTBSecConf 2008 that took place this week in Dubai. I know it’s sad, but the title of this blog is “passionate about information security”, isn’t it? Let me give you a bit of background before going […]
Whilst some researchers point out that chocolate may provide health benefits that include decreasing the risk factors for certain heart related diseases, further research indicates that it can also become a security threat, specially when women are around! I know it sounds funny, but so claims latest survey conducted by Infosecurity Europe over 576 office […]
I open the new section Papers & Presentations of this blog posting my latest article published on INSECURE Magazine: “Integrating ISO 17799 into your Software Development Lifecycle”. In this paper, published on the 11th issue of INSECURE Magazine (May 2007), I explain how information security controls can be integrated in the Software Development Lifecycle (SDLC) […]
Yes! I’m just writing my first post from the Apple Store at Regent Street (London) to let you know that I’ve just passed my SANS GCIA exam. Indeed, I know it could have been better (scored 89%) and that I scored even more on my first GIAC exam (GCFA -Forensics Analyst- that I took on […]
Find It Quickly
Find what you're looking for quickly by using our keyword search. Can't find it? Try our links below.