When we drive in our cars we don’t rely on just one thing to protect us. Here’s what you need to know about Defense-in-Depth.
Here’s a friendly list of DOs and DON’Ts to help protect you and yours this holiday season. Please – check it twice!
Until companies design products and services with them in mind, the work of protecting our privacy and security falls on consumers like you and I.
We don’t HAVE to use lame, beige, joyless keyboards. Unless we want to.
“We’re all grieving the reality that we’re vulnerable to cybercrime.” But we can do something about it. Here are some quick pro tips.
When I chose not to go to college, there were a lot of the kinds of reactions one might expect.
My little boy teaches me to innovate within a limited set of materials and parameters by asking me to draw a unique napkin for his lunch each day.
Every Christmas, while watching everyone tear into gifts of the world’s new hotness, I think about innovation: what it is, what it means, what makes it successful, and the key tenets of how innovations achieve wide adoption.
The biggest reasons to be concerned about your privacy aren’t what you might think.
Last night, in a dream of all things, I was reminded of a very real encounter that changed my perception for so much the better.
I just wrapped up a few weeks of classes at the birthplace of improv: Chicago’s inimitable iO Theater down on Kingsbury.
Like making lists? Me, too. Even though my lists may not look like lists in the traditional sense, they still serve a pretty cool purpose.
Farmers survive by quickly learning how to do many things. Out of necessity in this high-tech era, they’ve also become hackers.
Work looks the same as play. It’s difficult to tell if you’re on Insta or looking at that spreadsheet accounting just sent over.
WARNING –> This is a long read, which is why the important stuff is at the top.
If you’re trying to teach fish how to swim, it helps if you put them in the water.
Generally speaking, don’t use jargon. Just, don’t.
Before I moved to the State of Abe a few years ago, I lived in Juneau, Alaska. From time-to-time, I worked with military personnel, most often legal counsel, the types that handle deals to procure real estate on which to build things, all kinds of things, from barracks to administrative offices, training facilities and storage…
Tired: DIY (Do-It-Yourself)
Wired: DIT (Do-It-Together)
I spent some free time this past weekend going to see Oliver Stone’s latest, Snowden, the wild tale of a talented technologist who trades his stable life for something larger than himself. Say what you want about all of this, I am of the opinion that Snowden acted from a place of earnestness at great…
My awareness of the word ‘adaptation’ began as a 5th grader in Mr. Johnson’s 6th grade class.
UX matters if we want to help others make better choices.
My pal, Kim Crawley, wrote about her experience at SecTor in Toronto and was kind enough to include me in it.
Do you know what happens behind-the-scenes when you connect your phone to a car via USB or Bluetooth?
It isn’t often enough that a work like this, one of astonishing curiosity, intention, intelligent humour, and thoughtful artistry finds its way into my hands. Occasionally, such whimsical discoveries are connected to me in more ways than one.
The California Consumer Protection Act (CCPA) goes into effect on January 2020. Here’s what you need to know.
Robot networks or botnets have quickly grown in popularity among criminals. Here’s why and what you can do about it.
The move to a new understanding, an action, a motion that moves us closer to a broader perspective.
You may wonder, “I have antivirus installed so I’m good, right?” Nope. Anti-virus is better than nothing but it’s not good enough to be your sole protection against the more sophisticated types of threats we see today. Keep in mind that viruses are also a type of malware among several common types that anti-malware detects better…
Another #InvisibleOpSec – how to improve efficiency, security, and privacy with little or no cost and minimal effort.
It’s a great time of year to share a fun fireworks vid I made a ways back:
Data flow diagrams are visual illustrations of processes that can help elevate your business in short order.
A self-indulgent letter to a son from his dad to be read some day in the distant future.
Guardian’s firewall for iOS is about to be released in the U.S. Here’s some early thoughts on it.
Thank the gods there are smart and thoughtful people on the Internet like my pal, mzbat. So big gratitude to her because everything she touches turns to A W E S O M E. Today, she’s been sharing what she’s learning at Combating Cybersecurity Threats 2019. I’m interested. For starters, what bat’s live-tweeting validates what…
DMARC is complex so here’s a one-stop shop about what it is and how it can help minimize the number of phishing emails that reach your inbox.