Articles on Communication
- Incident Response Tips for Starting a Security Incident Response Program Create a hierarchy of incident response documents: brief executive-level policy, detailed procedures for technical managers, and guidelines/checklists for responders. Keep them succinct using bullet...
- Social Engineering How the Scarcity Principle is Used in Online Scams and Attacks The scarcity principle—people value less available opportunities more—powers online scams: fake expiration countdowns, CAPTCHAs before malware downloads, and login screens blocking desired content....
- Malware Getting to Know Larry Seltzer (Not Lenny Zeltser)
- Training Presentations, Webcasts and Speaking Engagements
- Training Benefits of Learning in a Group
- Social Networking Retrospective: Why I Started This Security Blog