Articles on Communication
- Communication The Lure of Notoriety for Information Security Experts If an expert makes a discovery that improves security, can they make a difference if no one hears about it? On-line presence builds professional reputation, but pursuing notoriety diverts attention...
- Incident Response Tips for Starting a Security Incident Response Program Create a hierarchy of incident response documents: brief executive-level policy, detailed procedures for technical managers, and guidelines/checklists for responders. Keep them succinct using bullet...
- Social Engineering How the Scarcity Principle is Used in Online Scams and Attacks The scarcity principle—people value less available opportunities more—powers online scams: fake expiration countdowns, CAPTCHAs before malware downloads, and login screens blocking desired content....
- Malware Getting to Know Larry Seltzer (Not Lenny Zeltser)
- Leadership Presentations, Webcasts and Speaking Engagements
- Training Benefits of Learning in a Group