In the realm of teaching, we often explore various pedagogical approaches, yet one that often raises questions is behaviorism. My recent reflections have led me to question whether behaviorism, a method that shapes behaviour through controlled environmental changes, is used more negatively than positively in education today. Behaviorism, for the …
If you only knew the power of the log side
This article focuses on a topic that is near and dear to my heart: logs. Whether the logs are application, infrastructure or device logs they are all important; critical even, I would argue and I’d hope you’d agree. Have you ever considered logs to potentially accumulate debt much the same as any other system.
The five philosophies of designing logs
TL;DR: Your logs should be simple, and structured, they should also contain enough information without disclosing sensitive data. Often accidental information disclosure within the logs can lead to future breaches. 1. The first philosophy: Keep it simple, structured and detailed enough: The first part of our first key philosophy when …
Why are we getting it so wrong in Healthcare and Medical Device Security?
Authors : Veronica Schmitt and Nina Alli We have observed the state of cyber-security in terms of healthcare and medical devices. We have been part of these industries as patients, dealing with digital forensics and incidents within these industries, as biohackers and researchers. We have seen the threat landscape and …
Medical device versus Healthcare device
Since becoming more active in the Biohacking and Healthcare Security field, I have noticed many terms used interchangeably (and incorrectly!) to describe devices within a Hospital or other Health Care settings. For example: all devices within healthcare and medical are seen as a medical device and they are all equal …
The story of a Patient
I am sitting here at a loss for words. There are simply too many thoughts going around in my head. Yes, most of them are nerves. You see tomorrow I will wake up, and head to hospital. Tomorrow, January the 14th I will have my old leads removed, and my …
Patient to Researcher
My journey to becoming an Independent Researcher with Medtronic When I received my implant 13 years ago, I became fascinated with the technology that kept me alive. I wanted to know more, and as any curious Hacker would do I researched my device. However I took a detour on my …
DEF CON Group DC2711 Event
This past weekend I had the privilege of attending the inaugural event for the DEF CON Group Johannesburg DC2711. The event saw a line up of both international and local speakers. I personally got to share the stage with fellow Goon and friend Jayson Street. The event saw an emotional …
My first DEF CON Journey
DEF CON always seemed like a far off dream for me. The stories I heard from others about the infamous Hacker conference thrilled me and scared me. I recently made my debut on the Information Security circuit due to friends kicking me out from my secret hideout. I am not …
Hello world!
I am sitting in the Prague airport, after yet another international conference and training. I am sitting here, and while drinking my coffee and water I feel privilege yet somewhat sad. I have one hell of a ride this year, 2018 has been busy and filled with laughs, tears, fears …