Quickly improve your network performance and security at home with a few solid tips.
Here’s what you need to know about making critical choices in the days ahead not to survive this adversity but to succeed in spite of it.
These crimes are on the rise. Here’s what you need to know.
We don’t have to use lame, beige, joyless keyboards. Well, not unless we want to.
Data flow diagrams quickly improve operational resilience. Here are some quick-win places to start.
When I chose not to go to college, there were a lot of the kinds of reactions one might expect.
My little boy teaches me to innovate within a limited set of materials and parameters by asking me to draw a unique napkin for his lunch each day.
Mice are a great analogy for Incident Response. Here’s a quick discussion about Threat Hunts & Assessments.
Like making lists? Me, too. Even though my lists may not look like lists in the traditional sense, they still serve a pretty cool purpose.
Farmers survive by quickly learning how to do many things. Out of necessity in this high-tech era, they’ve also become hackers.
Work looks the same as play today. Hard to tell if you’re on Insta or looking at spreadsheets accounting just sent over.
WARNING –> This is a long read, which is why the important stuff is at the top.
Generally speaking, don’t use jargon. Just, don’t.
The first part of this post built an analogy, that centralization is like DIY (Do-it-Yourself) and decentralization is like DIT (Do-it-Together).
If we can agree on that analogy, simply for the sake of conversation, then we can take it a step further by looking through that lens into some specific contexts where this approach can add value to our efforts by breaking down our silos.
Tired: DIY (Do-It-Yourself)
Wired: DIT (Do-It-Together)
Mom passed away. Here’s everything I learned from the experience about Vascular Dementia.
UX matters if we want to help others make better choices.
Hacking machines is easy. People are more challenging.
Neil Postman’s ‘Amusing Ourselves to Death’ (1985), is about how mass media turns real, complex issues into entertainment.
When Mom decided to donate her body to science, her choice taught me a lot about myself and others.
Huge lessons from unexpected moments and places.
Dark Patterns are design tricks used to exploit typical human behavior. Here’s what you need to know.
This is the sum total of everything we think we know about the Universe.
Here’s what you need to know about Smart Home security to protect you and yours.
These aren’t easy things to think about but they’re important. Here’s everything you need to know in one place.
Here’s how we can start taking our privacy back.
The Internet everyday people know through Google and Bing is less than 20% of the total number of sites that exist on the Internet. What is the Dark Web, anyway?
Advanced email security in one post that covers how SPF and DKIM can be combined to support DMARC.
My pal, Kim Crawley, wrote about her experience at SecTor in Toronto and was kind enough to include me in it.
Until companies design products and services with them in mind, the work of protecting our privacy and security falls on consumers like you and I.
“We’re all grieving the reality that we’re vulnerable to cybercrime.” But we can do something about it. Here are some quick pro tips.
It isn’t often enough that a work like this, one of astonishing curiosity, intention, intelligent humour, and thoughtful artistry finds its way into my hands. Occasionally, such whimsical discoveries are connected to me in more ways than one.
The California Consumer Protection Act (CCPA) goes into effect on January 2020. Here’s what you need to know.
Robot networks or botnets have quickly grown in popularity among criminals. Here’s why and what you can do about it.
The move to a new understanding, an action, a motion that moves us closer to a broader perspective.
Another #InvisibleOpSec – how to improve efficiency, security, and privacy with little or no cost and minimal effort.
It’s a great time of year to share a fun fireworks vid I made a ways back: