I went through all the re:Invent announcement and put together a list of the Top 10 relevant items for security minded teams.
Would you give your teenage kid with a newly minted drivers license your old honda to drive or your 2-door coupe that you ride on the weekends?
If you're sick, you can choose to treat the disease... or do nothing. But What if you don’t know you’re sick??
A lot of people talk about “shifting left” their application security, but what does that really mean? I’ll break it down for you a little and provide some actionable steps you can take.
A risk register is just a fancy cybersecurity term for “a list of things that introduce risk to the company”. In the post, I will walk you through why you need one, how to create it, and what to avoid
🔥Hot take... there is no cybersecurity talent shortage.
Lessons learned from last week's Uber hack
Scapegoat? 🐐 Ethics? Whistleblower? Executive? Doing Their Job? Fingers are being pointed in all directions these days! 👉🏼👈🏼
Twilio, Lastpass, Mailchimp, Signal, Plex, Samsung, Doordash, TikTok(?), and so many more! It's happening ya'll!
Security Leaders must embrace a multi-disciplinary approach in their jobs including organizational psychology, marketing, technology, and business. Today we'll veer into some neuroscience 🧠 analogs.
What started as a simple guide, became a 2000+ word brain dump of my past years' experience and learnings of Defcon. From Tickets to Villages to Digital Safety, join me on this journey...