John Harrington

John Harrington

Protect your reputation with SPF

You’ve just receive an email from a client saying: “Thanks — we’ve paid the invoice to the new bank account as instructed.” Super. No. Wait. What? You never sent them an email. Fuck! What happened? This type of attack is known…

How TOTP (time-based OTP) works

Two factor authentication is meant to add a second method, or factor, of authentication beyond the traditional username and password combo. In this article, we’ll explore one specific type of 2FA known as Time-based One-Time Password – TOTP. In this…

What is ARP?

ARP is a technology that underpins most networking and network security operations. There are so many primer and explanations out there already. So rather than pursue the traditional route, I wanted to explore an alternative method and explain it by…

Positive Paths To Safety

Balancing threats with solutions It’s really important to discuss cybersecurity risks and threats, but we must also accompany that discussion with a clear and positive path to resolution. If we only present the negative side, the problem can seem too…

Zero Trust – Hard on the outside

I’d be lying if I said, “they don’t make networks like they used to”. Sadly, we’re still making networks exactly like we used to, and that has to change. Crunchy on the outside, chewy on the inside Traditional networks are…

Do you carry cash?

Don’t worry, I’m not looking for a loan. I just want to know if you, right now, have any cash on your person. Or perhaps you’re just winging it, flying solo, tapping to pay, all the way. Let’s take a…

Why your Sec and Dev teams are butting heads

Why won’t Dev and Ops teams engage with your security program? Perhaps they’re sticking their heads in the sand, wilfully creating security holes. Uncaring. Perhaps they don’t understand the threat landscape, or they’d be taking this a lot more seriously!…