After my presentation at the Techno Security and Digital Forensics conference, I had a information security professional stop by to ask a few questions. He’s in the position where...
2019-06-24 (first published: 2019-06-10)
1,187 reads
Security through (by) obscurity is where we try to protect an asset by hiding it. Anyone who has ever played the game Capture the Flag knows that a motivated...
2019-06-21 (first published: 2019-06-05)
392 reads
I was interviewed yesterday by Stephen Wynkoop (twitter) for the upcoming SSWUG Virtual Conference on May 23rd. One of the questions was about how to keep management engaged on...
2019-06-07 (first published: 2019-05-21)
469 reads