How to cover up the cameras on your devices for some added peace-of-mind.
What Does Resilience Look Like?
How prepared is your team for strategic response to unplanned events that disrupt your business?
Improve Your Home Network’s Security & Performance
Quickly improve your network performance and security at home with a few solid tips.
The Path Foward In A Pandemic
Don’t just survive this. Succeed in spite of it. Here’s how.
Cynefín Framework
Here’s an awesome framework for solving big challenges by tackling them in smaller chunks.
Access and Memorialize Deceased Loved Ones’ Online Accounts
These aren’t easy things to think about but they’re important. Here’s everything you need to know in one place.
Our Smart TVs Are Watching Us?
Here’s how we can start taking our privacy back.
How To Protect Yourself From SIM Swapping
These crimes are on the rise. Here’s what you need to know.
The Definitive Guide to DMARC
Advanced email security in one post that covers how SPF and DKIM can be combined to support DMARC.
Not Your Grampa’s Keyboard
We don’t have to use lame, beige, joyless keyboards. Well, not unless we want to.
The Elephant in the Room
“We’re all grieving the reality that we’re vulnerable to cybercrime.” But we can do something about it. Here are some quick pro tips.
Comings & Goings (on networks)
Tools like arpwatch give us more insight into activities on our computer networks.
Fight Malware: Use DNAT Rules
Another #InvisibleOpSec – how to improve efficiency, security, and privacy with little or no cost and minimal effort.
Data Flow Diagrams Improve Everything
Data flow diagrams quickly improve operational resilience. Here are some quick-win places to start.
Skipped College, Learned From Linux Instead
When I chose not to go to college, there were a lot of the kinds of reactions one might expect.
Idea Machine
My little boy asks me to draw a unique napkin for his lunch each day. For 4 years.
Privacy and Security Matter for Reasons You Haven’t Thought Of. Yet.
The biggest reasons to be concerned about your privacy aren’t what you might think.
Speaking of Hackers
I may not like the stigma but suppose it’s time to admit to myself that, yeah, I’ve been a hacker for as long as I can remember.
Mouse Problems & Incident Response
Mice are a great analogy for Incident Response. Here’s a quick discussion about Threat Hunts & Assessments.
The Power of Lists
Like making lists? Me, too. Even though my lists may not look like lists in the traditional sense, they still serve a pretty cool purpose.
Let’s Talk About Penetration Testing.
I recently had the pleasure of assembling + moderating an industry panel of leading experts to discuss Penetration Testing. Heaps of gratitude to Dawid Balut, Mattia Campagnano, Kimber Dowsett, Chris Roberts + Georgia Weidman for sharing their well-grounded thoughts on an often polarizing topic.
Farmers Fight for Our Right to Hack
Farmers survive by quickly learning how to do many things. Out of necessity in this high-tech era, they’ve also become hackers.
Impervious to Change
Work looks the same as play today. Hard to tell if you’re on Insta or looking at spreadsheets accounting just sent over.
TAG, you’re it.
Yesterday was kind of a big deal, celebrated quietly inside my own heart. It was the 10th anniversary of the day I completed a labor of love that changed my life for so much the better.
Protect Yourself on Facebook
Still using Facebook? Here are some tips to use it more safely, protect your identity, and detect fakery.
Restoring Curiosity – The Hacker Manifesto
Remember being little and curious? It’s not too late to get it back.
IoT, IIoT, and Reality
WARNING –> This is a long read, which is why the important stuff is at the top.
Why We All Need Media Literacy.
If we’d only just discovered that the Earth is round, there’s still a bazillion websites out there claiming it’s flat.
Peter Gabriel is Right About Jargon
Generally speaking, don’t use jargon. Just, don’t.
DIY vs. DIT – Part II
The first part of this post built an analogy, that centralization is like DIY (Do-it-Yourself) and decentralization is like DIT (Do-it-Together).
If we can agree on that analogy, simply for the sake of conversation, then we can take it a step further by looking through that lens into some specific contexts where this approach can add value to our efforts by breaking down our silos.
Unlikely Lessons in UX
Insights often reveal themselves in the most unlikely ways.
“Do It Yourself” (DIY) vs. “Do It Together” (DIT)
Tired: DIY (Do-It-Yourself)
Wired: DIT (Do-It-Together)
VR, AR + MR: Designing the New Reality Experience
UPDATE: this post was published on InVision’s blog. You can read that version here.
IMHO: Cybersecurity is dead.
Cyber Security is dead. Here’s my honest opinion.
Level Up: Data Classification
Level up your resilience to fraud, identity theft, global events & more.
Living With Dementia
Mom passed away. Here’s everything I learned from the experience about Vascular Dementia.
Great UX Makes Infrastructure Sexy
UX matters if we want to help others make better choices.
Googling for Talent
Hacking machines is easy. People are more challenging.
Creating Meaning in the New Media Ecology
Neil Postman’s ‘Amusing Ourselves to Death’ (1985), is about how mass media turns real, complex issues into entertainment.
Understated Upsides to Donating Our Bodies to Science
When Mom decided to donate her body to science, her choice taught me a lot about myself and others.
Communication is Art
Huge lessons from unexpected moments and places.
Dark Patterns
Dark Patterns are design tricks used to exploit typical human behavior. Here’s what you need to know.
Where We Are. Probably.
This is the sum total of everything we think we know about the Universe.
It’s Beginning to Look A Lot Like Riskmas
This is a list worth checking twice this year: baseline DO’s to get the most magic out of the season.
On Kids & Guns
It’s controversial but important. As a parent, here’s my perspective.
Help Your Home or Office from Getting Easily Hacked
Here’s what you need to know about Smart Home security to protect you and yours.
The Dark Web Is An Onion
The Internet everyday people know through Google and Bing is less than 20% of the total number of sites that exist on the Internet. What is the Dark Web, anyway?
SecTor 2019 Redux
My pal, Kim Crawley, wrote about her experience at SecTor in Toronto and was kind enough to include me in it.
DNS-over-HTTPS + PiHole = Better Privacy?
Until companies design products and services with them in mind, the work of protecting our privacy and security falls on consumers like you and I.
When Judaism Meets Science
This is a work of sheer curiosity, intelligent humor & thoughtful meditation.
Data Rights Are Human Rights
The California Consumer Protection Act (CCPA) goes into effect on January 2020. Here’s what you need to know.