Articles on Communication
- Assessments Tips for Creating a Strong Cybersecurity Assessment Report Creating a strong security assessment report requires analyzing data beyond tool output, prioritizing findings by risk, documenting methodology and scope, and providing practical remediation...
- Communication Balancing Brevity and Verbosity in Business Communications Brevity is usually the right call. The harder skill is knowing when to go long.
- Social Engineering The Need for Ethics When Researching Social Engineering Studying social engineering helps strengthen defenses against persuasion-based attacks, but research must be conducted ethically. The term "con artist" glorifies fraud; social engineering without...
- Communication One-Year Anniversary of this Blog
- Malware The Use of the Modern Social Web by Malicious Software Modern malware exploits the social web ecosystem: using social networking sites for command-and-control, controlling social media content for financial/political rewards, distributing links for...
- Risk Management The Contagious Smell of Fear in Cybersecurity Security decisions are affected by factors beyond rational analysis—choice fatigue, sleep deprivation, and anxiety. Research shows fear can spread through scent; women who smelled "fearful sweat"...