Stop Calling It Digital Transformation – You Just Bought a Shiny New Firewall Let me get this out of the way right now: Implementing a new SIEM or slapping AI on your broken... 2 August 2025 Blog / Mumbo Jumbo
Malware Analysis – Lesson 2: Advanced Techniques and Practical Examples 1. Advanced Static Analysis: Unpacking and Deobfuscation Understanding Packers Packers compress and encrypt executable files to evade detection and analysis.... 11 April 2025 Blog / InfoSec
Subtle Guide to Malware Analysis 1. Introduction to Malware Analysis Malware analysis is the process of determining the functionality, origin, and potential impact of malicious... 11 March 2025 Blog / InfoSec
The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1 An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version... 17 January 2025 Blog / Mumbo Jumbo
An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of... 4 January 2025 Blog / Mumbo Jumbo / Tech