Skip to content Skip to footer

Author page: alex

Microcircuit with chip close up

Operating System Security

Operating Systems offer unique insights into how to write complex software securely. In this presentation, I look at how different security-focused operating systems approach security, and take a look at what their approaches mean for security students.Key Take-awaysAdhering to good software development practices reduces riskReducing complexity and focusing on the best technical…

Read More


Driving User Adoption of Security Best Practices

95% of cyber attacks involve user error. How can we break resistance and drive meaningful long-term change?Key Take AwaysBy separating changes into small steps, we can make resistance more difficult and change more meaningfulSources presentation and page are subject to the disclaimers at repeatedly and inaccurately refer…

Read More

GCI for S&P Global Ratings

Risk and Trust Drive Global ChangeAs the world’s largest credit rating agency, S&P Global understands risk and trust. Creditors trust S&P risk analyses to drive decisions about long-term viability. These decisions have a profound impact on the world and determine the bond rates for governments and enterprises. To maintain customer trust and meet demand…

Read More

Silhouette keys

Encryption of Time-Series Data

In this presentation, I discuss my recent project that aims to make time-series data better encrypted. Currently, encryption among several clients relies on static keys. This is far from ideal, as it means that compromised keys can result in the entire communication chain becoming compromised. Using polynomials, we can efficiently update shared keys among large…

Read More



Omnivoz Derive enables key exchanges with multiple clients while preventing communication leaks if any individual multicast packet is lost. It provides crucial safety for enterprise networks, communication applications, live streaming providers, and many other aspects of modern technology. The solution is very efficient, even on low-powered devices, and usually does not even require any clients…

Read More