While many of my readers assert I can make the most complex or obscure technologies understandable through my writing, I’ve always struggled to do the same with myself. Instead of sharing every nuance of the long-winding road that is my life, I’ll simply share a selection of points and invite further discussion. I think we’ll get along very well, so thank you for dropping by!
This past year, I made some money writing and publishing stories on Medium, and I couldn’t be happier with the results. I made money, and so can you if you’re willing to persist.
While this article might get lost in the noise of others telling you “how to get rich” writing, this is not one of those stories. Instead, this is my journey with the platform over the past year.
For years, I wrote posts and articles on LinkedIn and while some of them generated many comments and reactions, not a cent was made aside from a bit more exposure to current and prospective clients of my employer. …
Part 2: Australia vs Canada
I spend a lot of time focusing on our cybersecurity strategies and controls here in Australia and what other sovereign nations worldwide are doing to safeguard their data and systems. Regardless of whether other countries are part of the commonwealth or not, many similarities assure us we’re on the right path and differences we can learn from and adopt.
This article will review the Government of Canada Communication Security Establishment (CSE) Canadian Centre for Cyber Security (CCCS) Top 10 IT Security Actions. …
Part 1: Australia vs. New Zealand
I spend a lot of time focusing on our cybersecurity strategies and controls here in Australia and what other sovereign nations around the world are doing to safeguard their data and systems. Regardless of whether other countries are part of the commonwealth or not, many similarities assure us we’re on the right path and the differences show us what we can learn from and adopt.
In brief, I have been reviewing the Computer Emergency Response Team New Zealand (CERT NZ) Ten Critical Controls for organisations and how similar they are to our own Australian Cyber Security Centre’s (ACSC) Essential Eight Strategies to Mitigate Cybersecurity Incidents. …
Working from home may be a new way for some, but how do you deal with distractions? For me, WFH life is status quo, and I’ve developed a tolerance, nay, an immunity to distractions. How many of you have these? How do you handle them?
Distraction 1: Traffic