From CISA,CISM,CRISC to CGEIT & CCISO: My Glorious, Exhausting, Sarcastic Rise to Cybersecurity Nobility.From CISA to CCISO: My Cybersecurity Certification Odyssey From CISA to CCISO: My Cybersecurity Certification Odyssey It all started with one innocent decision: “Maybe I’ll get a certification.”... 25 September 2025 Blog / Mumbo Jumbo
Stop Calling It Digital Transformation – You Just Bought a Shiny New Firewall Let me get this message out of the way right now: Implementing a new SIEM or slapping AI on your... 2 August 2025 Blog / Mumbo Jumbo
Malware Analysis – Lesson 2: Advanced Techniques and Practical Examples 1. Advanced Static Analysis: Unpacking and Deobfuscation Understanding Packers Packers compress and encrypt executable files to evade detection and analysis.... 11 April 2025 Blog / InfoSec
Subtle Guide to Malware Analysis 1. Introduction to Malware Analysis Malware analysis is the process of determining the functionality, origin, and potential impact of malicious... 11 March 2025 Blog / InfoSec
The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1 An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version... 17 January 2025 Blog / Mumbo Jumbo
An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of... 4 January 2025 Blog / Mumbo Jumbo / Tech