Thomas Kranz

Tom’s career has spanned over 25 years, as a consultant within Cyber Security and IT. After a successful career helping UK Government departments and private sector clients (including Betfair, Accenture, Sainsburys, Fidelity International, and Toyota), Tom now advises and supports organisations on their Cyber Security challenges.

Tom lives with his partner in Italy, where they rehabilitate their collection of rescue dogs and cats, as well as managing their many opinionated ducks.

Building your career in Cyber Security: Certifications

"The long term benefits of sunscreen have been proved by scientists, whereas the rest of my advice has no basis more reliable than my own meandering experience. I will dispense this advice, now." Following on from my previous article about getting started in Cyber Security, I want to move on to certifications. I've interviewed a lot of people over the years. A lot. And then I've had to built out and lead teams for various clients with the people I interviewed and hired. Certifications are a rec

How do I get into Cyber Security?

Along with "You can't say that" and "Hey, how'd you get in here?", one of the things I've been hearing from people recently is "How do I get a career in Cyber Security?" I thought I'd throw my notes from those conversations in a sort of Liber Primus for those interested in moving into Cyber Security - either as a side hustle or a career. First: what is it you actually want? I need to be honest - if you're in it for the money, there's much better options out there. Work in finance. Become a pol

Why cyber security needs to be prioritised at board level

There is growing evidence that cyber attacks are now deliberately targeting executives and board members – not businesses themselves – which shows that attackers believe this group is particularly vulnerable as well as valuable. More must be done to raise awareness of potential cyber threats at board level, as well as supporting businesses in developing a strategy that offers solutions to combat potential weaknesses in a company. Typically, hackers attack companies and their employees to steal

Breaking the chains: How FUD is holding the cyber sector hostage

Fear, uncertainty and doubt (FUD) has become an ever-looming cloud over the cyber sector in recent years as companies and suppliers pounce on the opportunity to capitalise on this rhetoric and peddle their wares to fearful customers. To misquote the age-old advertising maxim: fear sells. Of course, the big problem with this is that customers and, businesses – people – become immune to the constant avalanche of outlandish claims and equally outlandish fears. “FUD fatigue” is something that, unfo

The Matryoshka Dolls of IT

I often get complaints from clients that their IT projects are always cumbersome, delivered late and over budget. They’ve had an impact on the business, certainly, but it’s far from a positive one. There’s a lot of blame to go round for this, and finger pointing can be fun, but what needs to be done is to get our C-level stakeholders and project sponsors to understand the implications of proposed work versus timelines. Building a solution as a green field implementation is easy - there’s nothin

The DAOO Loop

Everyone should be familiar with John Boyd’s OODA loop - Observe, Orient, Decide, Act. There are a number of variations (pick a favourite!) but the basic premise remains the same: you gather information before acting. Witnessing recent transformation projects that have run into difficulties, or foundered completely, I’ve seen people trying to use a twist on this - the DAOO loop. Transformation projects are complex, and as I’ve discussed before, they should never be driven by technology or impl

Larry Ellison: What Am I Missing About Cloud?

Larry Ellison: What Am I Missing About Cloud? Things have been settling down a bit since the rush of information from Oracle after their takeover of Sun Microsystems was approved. The webcast was a marathon event, and it contained a lot of useful (and re-assuring) information for those of us who deal with Sun on a daily basis.As usual, Larry Ellison's keynote speech was the highlight of the event. Mad Larry is one of the few CEOs left in IT who feels powerful or comfortable enough in his positi

Potential Fallout from an IBM and Sun Deal

A big statement? Sure, but one backed with lots of examples other than this newest one about IBM's interest in buying Sun: • Oracle enters the hardware business in partnership with HP, potentially angering its other partners. • HP is coming out with data switches for datacenter applications, coming in conflict with Cisco. • Even Google is rumored to be developing a router. • Cisco is not only entering the server market, but expanding the concept to treat computing, networking, storage, and virtu

All the gear and no idea

Support when you need it, where you need it. Even with high-tech security in place, many companies still suffer cyber attacks due to simple set-up blunders. Most companies that suffer a cyber attack believed it would never happen to them. What makes it even harder to understand is the costly, cutting-edge security they had in place to deter hackers. But, these strong defences turn out to be a cyber Maginot Line if they’re not activated or deployed properly – ineffective because they could be e
Close