Professor John Walker

170 0

john_walkerVisiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [to 2015], Independent Consultant, Practicing Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), Fellow of the British Computer Society (BCS), Fellow of the Royal Society of the Arts (RSA), Board Advisor to the Digital Trust, Writer for SC Magazine UK, Originator of DarkWeb Threat Intelligence, CSIRT, Attack Remediation and Cyber Training Service/Platform, Accreditation Assessor and Academic Practitioner and Accredited Advisor to the Chartered Society of Forensic Sciences in the area of Digital/Cyber Forensics.

Twitter: @SBLTD 

John Walker is also our Expert Panel member.  To find out more about our panel members visit the biographies page.

Articles by Professor John Walker

planet

Just What Planet Are We On?

I have been listening to, and reading the debate relating to the safety of children when they are on-line, and the associated privacy/dangers which are ever-present when such young person’s engage with the World Wide Web – and I have become increasingly irritated, and frustrated by the comments made by those who call themselves professionals, …

0 comments
web

Web Bait to Misery

The Internet is a wonderful thing, and since its conception it has brought joy to millions of people in the form of extended communication networks, education, on-line shopping, employment and opportunities. Reaching out to far-flung corners of the global community which once would have been neglected by their domicile locality. In fact, one may conclude, …

0 comments
theoretical-world

The Theoretical World Of Known Knowns And The Tesco Heist

The interesting thing about Incident Response, and the Discipline of Digital Forensics is the need to attempt to backtrack on 1) How a security breach occurred? 2) What Actors were in play? And 3) Where any vulnerabilities or points of exposure present which supported the breach to play? – or more the point, do they …

0 comments
john walker

Black Sabbath

In a world of technological dependence, I like most other professionals suffer from increasing degrees of paranoia, and fear that my person, presence, and logical footprint may be subject to some form of compromise, interception, or manipulation from any one of many exposures – a Paranoid State which has driven my acquisition and use of …

0 comments
security biscuit 2015

2015 Security Biscuit

When it comes to taking the security biscuit for 2015, I believe the recent discovery of a security flaw in FireEYE deserves the award for bringing the matter of Security Complexity to our operational attention. However, I do wish to clarify up front that this is by no means a dig at the product in question. In …

0 comments
isb expert panel question

Defining Research Priorities in Cyber Security

For month of November, question to our expert panel members is: Which research topic or project in cyber security do you think deserves more funding from Government or other sources and why? and response is below: To find out more about our panel members, please visit the biographies page

0 comments
essential security practice

Three Essential Security Practices that an Organization Must Adopt to Avoid IT Security Breaches

APRIL QUESTION TO OUR EXPERT PANEL MEMBERS:  If you have to choose three essential security practices that an organization must adopt to avoid IT security breaches, what will you choose and why? RESPONSES Professor John Walker | @SBLTD In this current cyber-storm of successful security breaches, the three practices I would include are: Deploy the capability …

0 comments
Odd-Bedfellows

The Box of Odd-Bedfellows

Considering the opinion of Martha Lane Fox who has called upon the UK to lead the way by setting up neutral, independent body to ensure that ‘privacy’, ‘security’ and ‘trust’ are maintained on the internet would seem to be a considerable expectation which, when conjoined represent a very big ask indeed, as when aggregated these …

1 comment
Human mind and IT security

Curly Hair Don’t Work for Security Awareness

We are starting to arrive at the conclusion that it is the people who make our organisations insecure – right? It is the people who are those assets who are protected by the firewall, and perimeter defences, yet these very same people-assets are usually the ones who allow some delinquent logical attack to gain the …

1 comment
john_walker

The Imagination of Security

Professor John Walker comments on a recent security incident in which the Nottinghamshire Police web site was defaced by AnonGhost.

0 comments