Cyber Security, Without the Noise
I’m Tayven, and I focus on the parts of cyber security that actually matter: real‑world awareness, practical defence, and clear guidance across vulnerability management, patching, blue‑team operations, and strategic leadership. No jargon. No hype. Just experience you can use.
Featured Articles
How to Build a Vulnerability Management Program
This guide details a practical, cost effective approach I used to establish a vulnerability management program
How to Build a Cyber Aware Workplace Culture
Here’s a practical, human centred guide to building a Cyber Aware Workplace Culture, with real examples that actually worked.
“Hi Dad, I Dropped My Phone”: How a Simple Text Stole $3600 And Why This Scam Is Exploding
A late night message from an unknown number, the starting point of a $3500 scam.
4 Ways I Got Uni for Free and Got Paid to Study (Without Being a Genius or Gaming the System)
Most people enter tech with a HECS debt, a personal loan, or a quiet sense of financial dread.
I accidentally did the opposite.
Latest Articles
- Retro: The Day the Internet Tried to Reboot Me: My Blaster Worm Story (2003)When My PC Suddenly Turned Into a Countdown Timer If you were online in 2003, you probably remember this moment. I was sitting at my computer, Windows XP humming away, dial‑up screeching in the background when suddenly my screen froze and a Windows dialog box popped up: “Windows must now restart because the Remote Procedure… Read more: Retro: The Day the Internet Tried to Reboot Me: My Blaster Worm Story (2003)
- Privacy Awareness Week 2026: Privacy Is a Skill, Not a SettingMost people still treat privacy like a checkbox. A toggle. A once‑off task you do when you set up a new phone or download a new app. But in 2026, in a world where AI is woven into every tap, swipe, scroll, and “Allow access” privacy has evolved into something else entirely. It’s no longer… Read more: Privacy Awareness Week 2026: Privacy Is a Skill, Not a Setting
- Build Log #2 – Designing for Real People, Not Just ScreensVersion 1 of the site is officially live, and this week was all about turning a rough layout into something that actually works for real people. Not just on a big desktop monitor, but on the device most visitors will use first: their phone. Accessibility and usability aren’t optional anymore, they’re the baseline so this… Read more: Build Log #2 – Designing for Real People, Not Just Screens
- “Hi Dad, I Dropped My Phone”: How a Simple Text Stole $3600 And Why This Scam Is ExplodingA Real Incident Response Case This wasn’t a hypothetical scenario or a second‑hand story, it was a real incident I handled during an incident response call. These impersonation scams are not targeted attacks; they’re mass‑sent messages blasted out to thousands of numbers at once, hoping that one or two people respond at the wrong moment.… Read more: “Hi Dad, I Dropped My Phone”: How a Simple Text Stole $3600 And Why This Scam Is Exploding
- The Essential 8 Explained Like You’re New to Cyber (But Want to Actually Understand It)If you work in Australia, you’ve probably heard someone mention the ACSC Essential 8 in a meeting, usually right before everyone nods like they understand what’s going on. Spoiler: most people don’t. The Essential 8 is Australia’s baseline cyber security framework, a minimum and a voluntary baseline standard organisations can adopt to meet their cyber… Read more: The Essential 8 Explained Like You’re New to Cyber (But Want to Actually Understand It)
- The Build Log #1 – How This Project StartedWhen I first set out to build a website, the plan was simple: create a clean cyber security profile I could link on a résumé. Nothing ambitious. Nothing long‑term. Just a place to put my work. But the moment I started building, the idea stopped behaving like a “portfolio” and started growing into something bigger.… Read more: The Build Log #1 – How This Project Started
- How to Get Into Cyber Security: How I Broke In After 15 Years in ITPeople love to say you can “break into cyber in 90 days.” Others act like you need a decade of networking experience, a CCIE, and a blood oath under a full moon just to be considered. The truth sits somewhere in the middle, and my story lives firmly in the slow, steady, human category. I… Read more: How to Get Into Cyber Security: How I Broke In After 15 Years in IT
- APRIL 2026 SECURITY PATCH ROUNDUP – Windows, iOS, macOS, Android, LinuxThis month’s roundup covers the latest security updates from Microsoft, Apple, Google, and the major Linux distributions. Inside you’ll find the new Windows KB release, Apple’s iOS and macOS security fixes (including the DarkSword patch), Google’s April Android bulletin, and the current security advisories from Ubuntu. The report outlines the key vulnerabilities addressed across each… Read more: APRIL 2026 SECURITY PATCH ROUNDUP – Windows, iOS, macOS, Android, Linux
- Introducing the Patch Management SeriesEvery month, the major platforms we rely on release security updates that quietly close the gaps attackers love to exploit. Most people never read the advisories. Most organisations don’t have time to track five different ecosystems. That’s why this series exists. Threat‑intel from early 2026 shows attackers are exploiting critical vulnerabilities twice as often and… Read more: Introducing the Patch Management Series
- 4 Ways I Got Uni for Free and Got Paid to Study (Without Being a Genius or Gaming the System)Most people enter tech with a HECS debt, a personal loan, or a quiet sense of financial dread. I accidentally did the opposite. Every qualification I’ve earned, TAFE, university, under‑grad and post‑grad ended up costing me almost nothing. Not because I’m a genius. Not because I gamed the system. But because I learned one simple… Read more: 4 Ways I Got Uni for Free and Got Paid to Study (Without Being a Genius or Gaming the System)
- Hack The Box Web Exploitation Pathway: 4 Ways I Strengthened My Cybersecurity ToolkitIf you want to become a stronger defender, learn to think like an attacker. That mindset is what led me to the Hack The Box Web Exploitation Tester Pathway, a hands‑on, challenge‑driven experience that expanded the way I understand, analyse, and secure modern web environments. What began as curiosity quickly became one of the most… Read more: Hack The Box Web Exploitation Pathway: 4 Ways I Strengthened My Cybersecurity Toolkit
- The Toll Scam Text Message That Hit Me Inside the TunnelThe Everyday Cyber Security series is a practical, jargon‑free guide to staying safe online with small, easy habits. There’s a moment in every horror movie where the character realises the threat isn’t outside, it’s already inside the house! My version of that happened in the NorthConnex tunnel. I’m sitting in the passenger seat, enjoying the… Read more: The Toll Scam Text Message That Hit Me Inside the Tunnel
- How to Build a Vulnerability Management ProgramSeries: Vulnerability Management This article outlines practical steps for developing a modern vulnerability management program, based on real-world experience, covering free tools, patching, and reporting. Read my previous article in the series: Free Vulnerability Scanning with OpenVAS: Essential Eight. A Real-World Guide A vulnerability scanner alone will not secure your organisation. Effective security requires a… Read more: How to Build a Vulnerability Management Program
- How to Build a Cyber Aware Workplace CultureHow to Build a Cyber Aware Workplace Culture (With Real Examples That Actually Work) Creating a cyber‑aware workplace isn’t about fear, compliance, or forcing everyone through another annual training video. It’s built through people, their habits, their values, and the everyday choices they make without thinking. Real security culture is when people don’t just know… Read more: How to Build a Cyber Aware Workplace Culture
- Everyday Cyber Security: Your Social Media Privacy ResetSocial media is part of everyday life, but it also exposes more personal information than most people realise. Scammers, data harvesters, and identity thieves rely on the small details people casually share. A social media privacy reset is a simple way to take back control of your accounts and reduce your risk. It only takes… Read more: Everyday Cyber Security: Your Social Media Privacy Reset
- Everyday Cyber Security: Think Before You ClickScams aren’t the clumsy, typo-filled emails they used to be, they now look exactly like the messages you trust every day. Today’s cybercriminals use AI-powered tools to create emails, texts, calls, and even fake videos or voice recordings that look and sound real. These scams are polished, personalised, and designed to catch you off guard.… Read more: Everyday Cyber Security: Think Before You Click
- Everyday Cyber Security: Strong Authentication Made SimpleWhy Strong Authentication Matters Most cyber incidents still begin the same way: someone gets into an account they shouldn’t. Weak passwords, reused credentials, and unsecured devices make it easy for attackers to impersonate you, steal data, or access your workplace systems. Strong authentication isn’t complicated, it’s a set of small, everyday habits that make your… Read more: Everyday Cyber Security: Strong Authentication Made Simple
- Everyday Cyber Security: Protect Your DevicesCyber criminals are always looking for weaknesses in our devices. Software developers and phone manufacturers regularly release free security updates to fix these vulnerabilities. By installing these updates, you close off an easy entry point attackers could use. Updating your devices is one of the quickest and easiest ways to protect yourself online. Why It… Read more: Everyday Cyber Security: Protect Your Devices
- Everyday Cyber Security: Travel Safety TipsTravel is one of the best ways to reset your mind, but it’s also one of the easiest times to slip up with your digital security. New countries, new networks, new risks. On my recent overseas trip, I treated cybersecurity the same way I treat my passport: non‑negotiable. These are practical, field‑tested steps I used… Read more: Everyday Cyber Security: Travel Safety Tips
- Introducing: Everyday Cyber SecuritySimple habits. Strong protection. No jargon. Welcome to Everyday Cyber Security, a new series designed to make online safety feel human, practical, and genuinely doable. Cyber security shouldn’t feel like a specialist sport reserved for experts. It’s part of everyday life now, woven into the way we work, travel, shop, bank, and stay connected. But most… Read more: Introducing: Everyday Cyber Security
- Free Vulnerability Scanning with OpenVAS: Essential EightWhen it comes to the ASD Essential Eight (E8), one of the hardest parts isn’t implementing the controls, it’s proving you’re actually maturing. Auditors want evidence, not promises. The good news is that you don’t always need expensive vulnerability management platforms to get there. I’ve previously used OpenVAS (Open Vulnerability Assessment System), a completely free,… Read more: Free Vulnerability Scanning with OpenVAS: Essential Eight























