Sample Work

Samples
You could say that this entire website is a sample of my work. Well, yes and no. Most of this site is writing for myself; and, if you hadn’t noticed, letting off steam about things that concern me. But when I write for a client, I write what the client wants the reader to read; not what I want to write.

Here are a few examples; and I’ll include more as time progresses. ‘Exclusive’ means you’ll only find it here on this site; that is, I’m writing for myself but it’s something I feel strongly.

  • Whitelisting Vs Blacklisting
    Traditionally, we use ‘blacklisting’ for our anti-malware defences. We create a blacklist of known malware, and stop them; allowing everything else to run. But should it be the other way round? Should we have a ‘whitelist’ of what we want to allow; and stop everything else? This article was written for, published by, and posted here with the kind permission of Infosecurity Magazine.
  • The infosec market in China
    “From the early days of Confucius throughout the history of the empire right to modern communist China, the driving force is the collectivist state and not the individual.” This article was written for, published by, and posted here with the kind permission of Infosecurity Magazine.
  • Social networks and security
    “Social networking applications are a very, very good idea; and they are characterised by a lack of built-in security.” This article appeared in the Guardian. It was written for, published by, and posted here with the kind permission of Lyonsdown.
  • Data Centres in the Cloud
    “…the complete migration of data centres into the cloud is simply not happening as fast as these arguments suggest it should; and that’s what we’re going to discuss…” This article was written for, published by, and posted here with the kind permission of Infosecurity Magazine.
  • Selling Biometrics to the masses
    Biometrics has been around for a long time; but has never quite been accepted? Why? What needs to be done to make it acceptable? This article was written for, published by, and posted here with the kind permission of Infosecurity Magazine.
  • Securing the Public Cloud for the Mobile Workforce
    This article looks at the collision of mobile and cloud computing; and examines the security issues that arise. It was included in the Raconteur supplement on Security in the Cloud that was published in the Times on 12 October 2010.
  • The fully virtualized environment
    This paper was written for Raconteur Media. It was included in the Raconteur supplement on Virtualisation published in the Times on 2 March 2010.
  • 2009 reviewed; 2010 previewed
    This was an exercise for myself just before I started this blog. It was written in December 2009. The idea was to produce a typical magazine/web article while at the same time laying down my security predictions for 2010. Time will tell if I got it right.
Follow

Get every new post delivered to your Inbox.

Join 141 other followers