Cyber Security

Luke Hally

Cybersecurity Blog

Welcome to my cybersecurity blog, exploring how people, processes and technology intersect.

This blog follows my studies throughout my recent Master’s of Cybersecurity Leadership, as it narrows it’s focus to a socio‑technical lens. It shares practical strategies for embedding security into organisational culture and everyday practices. You’ll find research‑driven analyses, real‑world case studies and guidance on navigating a complex digital landscape .

Latest Posts

Cyber leadership & governance

OpenClaw, Closed Fist

What Autonomous AI Exposes About Cybersecurity Maturity Introduction OpenClaw (and its various recent names) provides a useful case study for examining a persistent weakness in

Read More »
Cyber risk & resilience

Quantitative vs qualitative

Continuing on from our recent presentation to make a case for advanced cyber risk monitoring, RideWell’s management team would like your view and recommendation on

Read More »
Cyber risk & resilience

Advanced Cyber Risk Monitoring

The cyber security industry is increasingly recognising that they need to adopt mature risk management and monitoring practices in order to elevate the profession and

Read More »
Cyber & the law

Data breach notification

The Notifiable Data Breach scheme seemed so simple back when I started this Master’s degree. Now we are exploring its intricacies in my Cyber and

Read More »
Cyber threats & crime

Red teaming

An overview of Red Teaming and the role it plays in cybersecurity. Who should use it, how does it differ from penetration testing and is

Read More »
Cyber threats & crime

Cybercrime vs other crime

What distinguishes cybercrime from other types of crime, and why is this important to the cyber security profession? When considering what distinguishes cybercrime from other

Read More »
Aviation Cybersecurity

Evolving aviation cybersecurity

Introduction: The aviation sector Aviation is an important sector, employing 58 million people, contributing $2.4 trillion to global GDP and annually carrying 3.3 billion passengers

Read More »
Cyber ops

Hacking back

What is “hacking back”, what are its advantages and disadvantages, and what role does it play in cyber defence? Hacking back is “the ability to

Read More »
Cyber ethics

Apple vs FBI

This was my final assessment for the cyber ethics course, it was a great topic that brought together the ethical theories with a real world

Read More »
Cyber ethics

The Equifax breach

Equifax is one of the world’s largest credit reporting agencies (CRA), creating credit reports from consumer data which is sold to third parties. Being high

Read More »
Data security & privacy

Can I reset my fingerprint?

We all know that we should use unique passwords for each service (Facebook, Netflix etc) we use. This is to prevent a credential stuffing attack,

Read More »
Data security & privacy

Quantum computing

Quantum computers have potential for great advances in our understanding of the world, and it may be happening sooner than we think with recent advances

Read More »
Data security & privacy

The war on encryption

The ‘war on encryption’ – law enforcement attempting to bypass or limit consumer level encryption – is a global issue with many platforms utilising encryption

Read More »
Data security & privacy

Privacy

Looking in more detail at privacy this week. I encountered privacy in my first course, Foundations of Cyber Security. It had a profound impact on

Read More »
Data security & privacy

Attack Lifecycles

We see lifecycles everywhere, product lifecycles, software development lifecycles, data lifecycles. They are a useful way to gain a high level understanding of something and

Read More »
Data security & privacy

Asymmetric Warfare

Symmetry and asymmetry is something we see a lot of in cyber security. We break symmetry with passwords and authentication – making it easy for

Read More »
Data security & privacy

Data lifecycles

The data lifecycle is a useful tool to understand all of the stages data goes through. This can include: what is collected; how it is

Read More »
Data security & privacy

Intro to Data

The start of a new course this week, Data Security and Privacy. I’m looking forward to this one, we learn how to actually hack into

Read More »
Security engineering

Social engineering hack

“ Social engineering is an extremely effective technique used by hackers worldwide to compromise internal systems and proprietary information assets. In fact, it’s one of

Read More »