Welcome to my blog.

Leading in Pyjamas

I had a great day at the Lead Developer Austin conference last week. All of the talks were high quality and being at conference focused on leadersh...

Security Engineering and Tidal Forces

Last month I published a post on the Auth0 engineering blog which describes some of the work I have been doing there. The post is about Cloud Secur...

An Introduction to Network Visibility

In our Introduction to Security monitoring post we introduced the use of sensors to gather monitoring data. That article is a good place to start i...

The Cloud is More Secure

We attended the Netherlands AWS summit near Utrecht this week. It was a good opportunity to meet people who were using Cloud services in the field ...

The Security Bar

Security being an inherently defensive practice can make it difficult to quantify how well you are performing. Security is intangible, it is about ...

An Introduction to Security Monitoring

This is the first in a series of articles that will introduce some of the foundational information security concepts that are integral to the work ...

Print Hello World

This is the first post of my hastily put together blog.