Upcoming Speaking Engagements
January 15 2023This is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The...
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The...
Read moreBooklist reviews A Hacker’s Mind:
Author and public-interest security technologist Schneier (Data and Goliath, 2015) defines a “hack” as an activity allowed by a system “that subverts the rules...
Read more
Analyzing and learning from incidents is the ideal path to finding more insightful data and metrics, according to the VOID report.
Read moreGood advice on buying squid. I like to buy whole fresh squid and clean it myself. As usual, you can also use this squid post to talk about the security...
Read morePassword manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
Read moreThe bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted.
Read moreRhadamanthys spreads through Google Ads that redirect to bogus download sites for popular workforce software — as well as through more typical malicious emails.
Read moreHigh-profile software provider compromises in the past few months show that threat actors are actively targeting the services underpinning corporate infrastructure. Here's what to do about it.
Read moreWith the $7.2M contract, Cloudflare will enhance resilience and simplify security for .gov domain users.
Read moreEstablish clear and consistent processes and standards to scale lite threat modeling's streamlined approach across your organization.
Read more
Recent Comments