Cybersecurity Demystifying Multi-Factor Authentication Multi-Factor Authentication is critical for protecting against the weaknesses of passwords. But not all MFA is created the same, and it can be a confusing thing to do well.
Cybersecurity My Love Letter to Cybersecurity - 2025 I've been in cybersecurity since the early 2000's. It's difficult, frustrating, and thankless. And I still love it 20+ years later.
Personal Privacy Snake Oil: Beware VPN Services Cure alls from yesteryear were routinely cons whose benefits were generally imagined and not real. Unfortunately we still have some of those today in the form of bad personal cybersecurity solutions.
Personal Featured Pick Your Fediverse Social Media Adventure Migrating to the Fediverse from your existing social media platforms is a bit daunting. So let's arm you with some information for making a great choice.
Personal The Case of the Apple Gift Cards In January of 2020 I was a cybersecurity professional, and my wife was an account. We both know better, but we nearly got taken by a gift card scam.
Personal Featured Rethinking Your Social Media Experience Is the ban of TikTok the signal for you to rethink your social media habits? Why not?
Cybersecurity 2025's Cracked Crystal Ball It's traditional to guess at what's going to happen in your field for the new year, so here goes: there will be breaches. Also other things.
Cybersecurity Mamas Don't Let Your Babies Grow Up To Be CISOs Doctors and lawyers and such sound like good alternatives. Unless you've got the bug. What you, your board, and even the rest of us need to know about the CISO's situation.
Cybersecurity Pied Piper Introduces House 1.0 We don’t have a cybersecurity problem. We have a software quality problem - Jen Easterly, head of CISA at BlackHat 2024
Cybersecurity Cyber Disinformation Month Wrap-Up Cybersecurity Awareness Month is in the mirror officially. This is my "Disinformation" wrap-up post for all the bad ideas you may have heard this month.
Cybersecurity What Driving Can Teach Us About Cybersecurity Who are you sharing the road with? Is their security program even drivable? Do they even have a license? There's plenty to think about as we look at what driving can tell us about cybersecurity.
Cybersecurity Getting the Best Value From Penetration Testing Ring the bell, capture the flag, physical pen testing, dynamic app testing - a modern pentest has more options than many cars. How do you approach buying one?
Cybersecurity Bad Cybersecurity Advice Don't scan QR codes! Use an email to log in! Look for misspellings in emails! Just stop, please?
Cybersecurity Quickly Cutting Through the New Vulnerability Panic Why is every vulnerability the worst thing since sliced bread? Here are some tips for cutting through the clickbait and FUD to see if you need to be concerned.
Cybersecurity Driving Value Conversations in Cybersecurity and Technology Whether you're trying to convince management of a cybersecurity project, or trying to sell into your customer, mastering value-based conversations is critical for cybersecurity.
Cybersecurity Powerful Yet Overlooked - DNS as a Security Solution Almost nothing you do online works without DNS. It is ubiquitous. But have you ever thought about DNS as part of your security program? Controlling how it is used can make a significant impact on your environment.
Linux GRUB's No Good, Very Bad, Day (at the hands of Microsoft) A new Microsoft patch - for a 2 year old vlun - is preventing dual-boot computers from booting Linux. Monopolies at work again. Let's break that cycle.
Cybersecurity Axioms For Your Next Vendor Fair Experience Vendor swag. After parties. Badge scans and contact information harvesting. If you're a serious buyer (or influencer) at an IT or cybersecurity conference, you'll want to think about your vendor fair strategy.
Cybersecurity Lather, Rinse, Repeat - the Never Ending Cycle of Good Cybersecurity Like your doctor says when you go in for that annual physical you skipped: eat more veggies, get more exercise, sleep well. The same holds true for good cybersecurity - it's the repetitive, boring stuff that often matters most.
Cybersecurity The Internet of (Crap) Things Everything today from your furnace to your toilet can be Internet connected, but why do it? If you do connect them, how do you do so securely?
Cybersecurity Today's Outage Brought To You By a Lack of Competition The CrowdStrike and Windows problem isn't big because of the technical details, it's big because of the market one.
Personal To Sync Or Not To Sync... That is the question. Do you trade private data for convenience or not?
Personal Want Private, Secure Communications? Your Choices Are Limited Your email service reads your emails. Your test messages are plain-text. Your phone calls can be tapped. How do you communicate securely and privately?