The Revolution

How I became part of an invisible hacking revolution.

By Eh’den Biber

Remark – In contrary to my other writings (e.g. “making privacy great again”), this is going to be an evolving story. It means that I will be continuously updating it. Also, I plan to record it as a podcast so you could listen to it rather than read it.

[Changelog]

2017-05-14 – V01 – Long Drive + The Revolution
2017-05-15 – V02 – Stealing Fire + The Guinee Pig
2017-05-15 – V03 –  Ecstasis + Lost in the Rain + The Sacred Four
2017-05-21 – V04 – Frederick + Mad Intelligence
2017-08-13 – V05 – Time Capsule

Prologue – Long drive

13 years ago, when my youngest son Rephael was three and half years old, my ex-wife and I arrived to a Belgian hospital to hear the diagnostic of his condition. After months of observations and tests the result came in, and even though I remember everything that was said, looking back I realise that at that time I had no ability to grasp their meaning: “Your son has severe autism. It will never go away, it will not improve. You will never be able to communicate with him, you will never be able to send him to a normal school. Your son will never be able to be independent, your son will need to be in a mental institute when he will grow up.

Continue reading

Advertisements

Amygdalala-land

Amygdalala-land

Why is our brain not wired for information security and what can we do to change it?

Written by Eh’den (Uri) Biber, CISA/CISM/CRISC/CISSP and a member of the NeuroLeadership Institute.

.

Romeo Romeo, where art thou Romeo?

In the last two and a half months I disappeared from the face of the earth (other than the obvious occasional participation in selected information security events). I’ve enabled a very strict filter on my mailbox, I barely saw my girlfriend (I hope I still got one) and from morning till very late at night I set down to try and understand the subject of education in the field of Information Security.  I was digging deep into academic research papers, reading books, watching documentaries and interviews – you name it. Even during the security events I’ve took the opportunity to talk and interview as many people as possible. I wanted to find out what lead to the current situation, one in which information security education is under-funded, neglected, wrongfully planned, ineffective, and most of the time practically non-existing. Continue reading