Security Engineer
HackerOne

BIO:

Security Engineer

Articles and Comments By Laurie Mercer

Expert Commentary
Expert insights - USB Stick Containing An Entire City’s Personal Details Has Been Lost
June 28 , 2022 by Laurie Mercer
“Organisations can have the most sophisticated technology in the world, but there is no getting aw...
Expert Commentary
Why Its So Important For Organisations To Put Staff Welfare First When A Cyber-attack Strikes.
May 11 , 2022 by Laurie Mercer
When a cyberattack happens, guilt and blame often follow - but this is counterproductive. Openness,...
Expert Commentary
Is UK Food Supply Chain Highly Vulnerable To Cyber-attack, Expert Weighs In
July 13 , 2021 by Laurie Mercer
Supply chain attacks” are high on the agenda at the moment with SolarWinds and the Kaseya ransomwa...
Expert Commentary
Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling
January 25 , 2021 by Laurie Mercer
This is not the first time schools have had to switch to remote working so the discovery of malware...
Expert Commentary
Warwick University Hides Hack From Students And Staff - Experts Comments
April 29 , 2020 by Laurie Mercer
Warwick University suggests this was a failing in skills and experience. This is logical, there is a...
Expert Commentary
Security Expert Reaction On Huawei Calls Hackers To Munich For Secret Bug Bounty Meeting
November 06 , 2019 by Laurie Mercer
This is a good example of a company becoming more open and transparent on security to build trust. A...
Expert Commentary
NCSC Annual Review - Experts Comments
October 25 , 2019 by Laurie Mercer
Every organisation should have a vulnerability disclosure program - a formal process to accept vulne...
Expert Commentary
ECB Confirms Hacker Attack And Shuts Down One Of Its Websites
August 19 , 2019 by Laurie Mercer
While cyber attack simulations using red teams like the ones the European Central Bank deployed are...
Expert Commentary
Vulnerabilities Can Allow Hackers To Bypass £30 On Visa Contactless Limit
July 30 , 2019 by Laurie Mercer
This attack allows contactless verification limits to be easily bypassed if an attacker has physical...