Open in app

Sign In

Write

Sign In

Joel Samuel
Joel Samuel

74 Followers

Home

About

Jul 11

Phishing versus Defence-in-Depth

This post is brought you by two sticks and pure rage, because corporate simulated phishing campaigns are nearly always awfully done. I recently heard Emma Wicks speak about user-centric security and advocate for user-first ways of going about cybersecurity— I’ve learnt a lot from Emma and others over the years…

Phishing

10 min read

Phishing versus Defence-in-Depth
Phishing versus Defence-in-Depth
Phishing

10 min read


Jun 4

Risky smartphone travel — Part 3

This is the third and final post in a 3-part mini series on risky smartphone travel. Posts in this series Part 1— risks, threat actor capability, smartphone choice, VPNs, encrypted DNS, smartphone configuration Part 2 — contacts/accounts, the high risk travel itself, traveller preparation, mobile data -v- Wi-Fi, roaming, and monitoring Part 3 —…

Cybersecurity

2 min read

Risky smartphone travel — Part 3
Risky smartphone travel — Part 3
Cybersecurity

2 min read


Jun 4

Risky smartphone travel — Part 2

This is the second post in a 3-part mini series on risky smartphone travel. Posts in this series Part 1— risks, threat actor capability, smartphone choice, VPNs, encrypted DNS, smartphone configuration Part 2 — this post — contacts/accounts, the high risk travel itself, traveller preparation, mobile data -v- Wi-Fi, roaming, and monitoring Part 3…

Cybersecurity

7 min read

Risky smartphone travel — Part 2
Risky smartphone travel — Part 2
Cybersecurity

7 min read


Jun 4

Risky smartphone travel — Part 1

This is the first post in a 3-part mini series on risky smartphone travel. As usual, I have sat on this draft for a number of months and decided to dust it off after Kaspersky started discussing Operation Triangulation. In April 2018 I wrote ‘Being safe on hostile WiFi/mobile networks’…

Cybersecurity

10 min read

Risky smartphone travel
Risky smartphone travel
Cybersecurity

10 min read


May 21

The nail in the coffin for VPNs

I think about enterprise IT architecture and the VPNs within them a lot — probably far too much. VPN ecosystems cost a bunch of money, take significant operational effort to run, often lead to a terrible IT user experience, and are a breeding ground for vulnerabilities. …

Cybersecurity

10 min read

The nail in the coffin for VPNs
The nail in the coffin for VPNs
Cybersecurity

10 min read


Oct 9, 2021

An idea to make the UK the safest place to live and work online

In late 2020 I wrote that we should make URLs less important. The thinking was essentially two fold: Use technology to solve cybersecurity problems, don’t expect or make the general user do a bunch of stuff such as install a password manager (because they can’t/won’t) If you want to protect…

Cybersecurity

10 min read

An idea to make the UK the safest place to live and work online
An idea to make the UK the safest place to live and work online
Cybersecurity

10 min read


Aug 8, 2021

How to keep your smartphone safe from spying

This post discusses four personas, the technical threats to them and their information via their smartphone, and some theory on how to defend against an increasingly capable and focused threat actors. If you find yourself matching one of these personas, following the recommendations below may serve you well if you…

Smartphones

16 min read

How to keep your smartphone safe from spying
How to keep your smartphone safe from spying
Smartphones

16 min read


Mar 9, 2021

Could a tertiary name service save your uptime?

A few months ago I told someone in the UK Government that a tertiary nameservice could solve a handful of problems — including the ones they were handling in relation to “how many domains? why? WHO? asset discovery!” A Tertiary DNS Server is a second secondary server. That is, a…

DNS

5 min read

Could a tertiary name service save your uptime?
Could a tertiary name service save your uptime?
DNS

5 min read


Nov 11, 2020

A little bit more about URLs

A deeper dive into some aspects of my other post about making URLs less important. This isn’t quite a ‘Part 2’, but more of an expansion of some technological nuances that exist today when it comes to individual services and mechanisms to deal with domains and URLs. This posts extracts…

Cybersecurity

7 min read

A little bit more about URLs
A little bit more about URLs
Cybersecurity

7 min read


Nov 11, 2020

We should make URLs less important

URLs are bad for humans… so we should be tackling as many root issues as we can to help them, instead of suggesting technical solutions. Troy Hunt posted recently about humans being bad at URLs, which came about as a result of a bit of tooing and froing on twitter. …

Cybersecurity

11 min read

Cybersecurity

11 min read

Joel Samuel

Joel Samuel

74 Followers

The thin blue line between technology and everything else. joelgsamuel.com

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams