All Cyber-Kinetic Security & Cybersecurity Posts
-
Cyber-Kinetic Security
When Hackers Threaten your Life – Cyber-Kinetic Risks
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in…
Read More » -
Cyber-Kinetic Security
Human Zombification as an Information Security Threat
China and Russia share an information security doctrine, one that is significantly different from Euro-Atlantic doctrines. In the Chino-Russian model of information space a discussion about population zombification does happen and it fits squarely within the domain of information security. No, this is not an Onion article. China and Russia have significantly broader definitions of Information Security than US, UK and other mostly aligned Euro-Atlantic…
Read More » -
Cyber-Kinetic Security
Non-Executive Directors as Cyber Champions
As a non-executive director (NED) who often represents cybersecurity and emerging technology interests on boards, I’ve learned that even without being a deep technical expert, I must challenge management and ensure our company’s security posture is sound. In today’s high-risk digital environment, boards can no longer treat cybersecurity as "someone else’s problem." Directors cannot abdicate or simply delegate oversight of cybersecurity - we must instead…
Read More » -
Cyber-Kinetic Security
The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks
We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities.…
Read More » -
Leadership
MAS TRM Just Reset the Floor for Financial‑Sector Cybersecurity
I’ve spent the last few years in Singapore helping banks, insurers, and market infrastructure across APAC harden their environments. We’ve all said the same thing in private: we need a clear, enforceable baseline that trades vague “best practice” for concrete expectations and timelines. With the Monetary Authority of Singapore’s (MAS) Technology Risk Management (TRM) package - the Guidelines (principles/best practices) and the legally binding TRM…
Read More » -
Cyber-Kinetic Security
Cyber War – scaremongering or reality?
“Cyber war” is a term that is in recent days used so liberally that people may often wonder if these words are as menacing as they sound or used only as a tool to incite fear as a way to control a society that increasingly depends on technology. How we prepare and respond to cyber attacks depends on whether we believe we are in cyber…
Read More » -
Cyber-Kinetic Security
United We Secure: Why Cybersecurity Needs Information Sharing
The cyber battlefield is heating up. On one side, cyber criminals are pooling their knowledge like a well-oiled team; on the other, many organizations still act like lone wolves. I recall a fellow CISO remarking at a meeting, “I don’t need perfect security - just better security than the other guys. Then attackers will leave me alone.” This popular “outrun the bear” analogy - you…
Read More » -
Cyber-Kinetic Security
The Decline of Real Penetration Testing
As the leader of Cyber Agency, one of the largest penetration testing and red teaming specialist outfis, I have a bone to pick with where our industry is headed. Back in the late 90s and early 2000s, "pentesting" actually meant breaking into systems (and sometimes buildings!) with skill and creativity. Today, I’m watching a disappointing shift: more and more so-called pentests have turned into cheap,…
Read More »



