Cybersecurity Cyber Disinformation Month Wrap-Up Cybersecurity Awareness Month is in the mirror officially. This is my "Disinformation" wrap-up post for all the bad ideas you may have heard this month.
Cybersecurity What Driving Can Teach Us About Cybersecurity Who are you sharing the road with? Is their security program even drivable? Do they even have a license? There's plenty to think about as we look at what driving can tell us about cybersecurity.
Stories Adventures in cc:Mail, Now With Water! It was a Sunday evening like any other, until I heard water in the data center...
Observations From Corncon X I got to spend the end of last week at Corncon X in beautiful downtown Davenport Iowa. It was my first time at this event, and it was the first time in years that I visited a conference as just an attendee. I've been a vendor at these
Cybersecurity Getting the Best Value From Penetration Testing Ring the bell, capture the flag, physical pen testing, dynamic app testing - a modern pentest has more options than many cars. How do you approach buying one?
Cybersecurity Bad Cybersecurity Advice Don't scan QR codes! Use an email to log in! Look for misspellings in emails! Just stop, please?
Cybersecurity Quickly Cutting Through the New Vulnerability Panic Why is every vulnerability the worst thing since sliced bread? Here are some tips for cutting through the clickbait and FUD to see if you need to be concerned.
Cybersecurity Driving Value Conversations in Cybersecurity and Technology Whether you're trying to convince management of a cybersecurity project, or trying to sell into your customer, mastering value-based conversations is critical for cybersecurity.
Cybersecurity Powerful Yet Overlooked - DNS as a Security Solution Almost nothing you do online works without DNS. It is ubiquitous. But have you ever thought about DNS as part of your security program? Controlling how it is used can make a significant impact on your environment.
Linux GRUB's No Good, Very Bad, Day (at the hands of Microsoft) A new Microsoft patch - for a 2 year old vlun - is preventing dual-boot computers from booting Linux. Monopolies at work again. Let's break that cycle.
Cybersecurity Axioms For Your Next Vendor Fair Experience Vendor swag. After parties. Badge scans and contact information harvesting. If you're a serious buyer (or influencer) at an IT or cybersecurity conference, you'll want to think about your vendor fair strategy.
Cybersecurity Lather, Rinse, Repeat - the Never Ending Cycle of Good Cybersecurity Like your doctor says when you go in for that annual physical you skipped: eat more veggies, get more exercise, sleep well. The same holds true for good cybersecurity - it's the repetitive, boring stuff that often matters most.
Cybersecurity The Internet of (Crap) Things Everything today from your furnace to your toilet can be Internet connected, but why do it? If you do connect them, how do you do so securely?
Cybersecurity Today's Outage Brought To You By a Lack of Competition The CrowdStrike and Windows problem isn't big because of the technical details, it's big because of the market one.
Linux First Activities On Your First Linux Computer Just like with any brand new tech, there are some setup things to be done. Here's a good checklist for that first couple activities on your new (or newly installed) Linux computer.
Linux Installing Linux For the First Time Installing Linux for the first time can feel daunting. It's also quite freeing and rewarding. Let's get you started.
Personal To Sync Or Not To Sync... That is the question. Do you trade private data for convenience or not?
Personal Want Private, Secure Communications? Your Choices Are Limited Your email service reads your emails. Your test messages are plain-text. Your phone calls can be tapped. How do you communicate securely and privately?
Cybersecurity The Fallacy of a Safe Encryption Backdoor Governments the world over want mandatory backdoors into encrypted communications. But there's no such thing as a secure way to do this.
Personal Opt-In Vs Opt-Out, Consent In Privacy There is no privacy online without informed consent. But then there's also the opt-in, opt-out dilemma. And since opt-out favors the people who want your data, well...
Cybersecurity Now Is the Time For a Password Manager We gave people advice years ago on how to create strong passwords themselves. That advice is outdated, it's time for a password manager.
Cybersecurity Are You Prepared For When Your *aaS's Environment Is Hacked? Snowflake environments are being compromised left and right. Have you set yourself up for *aaS success, or is your company ready to be breached in a similar fashion?
Personal When Your Choice Impacts My Privacy Copilot+ Recall might be fine for you, but if I'm sharing any data with you your choice impacts my privacy. And that's just one example.
Linux If You've Ever Bought a Computer You Have All the Skills You Need To Run Linux Linux has a reputation as being too complicated for regular users. That's a myth that needs dispelling.