- Communication Balancing Brevity and Verbosity in Business Communications
Brevity is valuable when audiences lack time or inclination—use elevator pitches for executives, SWOT matrices for pros and cons, and keep emails short. Verbosity is appropriate when responding to...
- Social Engineering The Need for Ethics When Researching Social Engineering
Studying social engineering helps strengthen defenses against persuasion-based attacks, but research must be conducted ethically. The term "con artist" glorifies fraud; social engineering without...
- Communication One-Year Anniversary of this Blog
- Malware The Use of the Modern Social Web by Malicious Software
Modern malware exploits the social web ecosystem: using social networking sites for command-and-control, controlling social media content for financial/political rewards, distributing links for...
- Risk Management The Contagious Smell of Fear in Cybersecurity
Security decisions are affected by factors beyond rational analysis—choice fatigue, sleep deprivation, and anxiety. Research shows fear can spread through scent; women who smelled "fearful sweat"...
- Assessments Cheat Sheet for Creating Security Assessment Reports
There's surprisingly little online guidance about creating good security assessment reports. This one-page cheat sheet covers the general approach, data analysis, methodology documentation, scope...