top of page

DAVID READ
Computer Scientist |  Security Professional | Technical Mentor
Latest Articles


Writing Effective Security Requirements
When it comes to making sure development teams produce secure products; dropping a list of requirements on the developer's desk and...
Feb 5, 20217 min read


The Insider Attack Matrix
Some colleagues and I have recently released a new methodology to approach insider threat. A lot of fantastic work and case studies...
Jan 12, 20214 min read

Dragon CTF Writeup
I recently took part in DragonCTF, an awesome CTF run by the Dragon Sector CTF team. The CTF was great and pretty hard (for me at least)....
Dec 13, 20204 min read


Generic advice for working from home
Recently we had to provide some general advice for an entire company around being secure when working from home.
Apr 15, 20201 min read


So your entire company is working from home...
and you're supposed to secure it. With the hit of COVID, everyone is working from home, and the cybercriminals know it. It's times like...
Apr 7, 20204 min read


Can we prevent the unknown?
This article comes from the outcome of a discussion I had recently. The TLDR of the conversation was that the Security Architecture...
Mar 13, 20205 min read


Choosing the right SAST solution
Maintaining your developers’ productivity should be paramount. Part 2 covers several factors with SAST tools that can affect productivity...
Mar 13, 20207 min read


Choosing SAST tools, what matters?
Part II can be found here. A common mistake when picking a SAST tool is to choose the one you think will find the most vulnerabilities....
Mar 13, 20205 min read
Welcome Post
I've realised a few things, throughout my career in Cyber Security. Mainly: 1) What's obvious to a security professional might not be...
Dec 8, 20191 min read

bottom of page