I went through all the re:Invent announcement and put together a list of the Top 10 relevant items for security minded teams.
Would you give your teenage kid with a newly minted drivers license your old honda to drive or your 2-door coupe that you ride on the weekends?
If you're sick, you can choose to treat the disease... or do nothing. But What if you don’t know you’re sick??
A lot of people talk about “shifting left” their application security, but what does that really mean? I’ll break it down for you a little and provide some actionable steps you can take.
A risk register is just a fancy cybersecurity term for “a list of things that introduce risk to the company”. In the post, I will walk you through why you need one, how to create it, and what to avoid
🔥Hot take... there is no cybersecurity talent shortage.
Lessons learned from last week's Uber hack
Scapegoat? 🐐 Ethics? Whistleblower? Executive? Doing Their Job? Fingers are being pointed in all directions these days! 👉🏼👈🏼
Twilio, Lastpass, Mailchimp, Signal, Plex, Samsung, Doordash, TikTok(?), and so many more! It's happening ya'll!
Security Leaders must embrace a multi-disciplinary approach in their jobs including organizational psychology, marketing, technology, and business. Today we'll veer into some neuroscience 🧠 analogs.
What started as a simple guide, became a 2000+ word brain dump of my past years' experience and learnings of Defcon. From Tickets to Villages to Digital Safety, join me on this journey...
There are different security orgs out there... some are glamping, others are backpacking on a shoestring. Let's explore the different kinds out there...