- Malware Antivirus Products Are Like Cold Medicine - Not A Rant
Antivirus products resemble cold medicine: established offerings have few differentiating characteristics, they treat symptoms rather than underlying problems, core technologies haven't changed...
- Networking The Hidden Costs of Information Security Projects
Security projects often underestimate hidden costs: requirements gathering, transitioning from current solutions, project oversight, validation of completion, and personnel training. Applying Total...
- Training Traits of a Good Manager of an Information Technology Team
Technical expertise rarely correlates with management ability. Google research found employees valued even-keeled bosses who made time for one-on-ones, helped puzzle through problems by asking...
- Encryption Fun Ways to Change Behavior and Improve Security
Fun can act as positive reinforcement for security behaviors—more powerful than negative reinforcement. Ideas include rewarding badge swipes with jokes, entering complex password users in raffles,...
- Training Developing Cybersecurity Skills Through Deliberate Practice
Years of experience alone don't create expertise—improvement requires deliberate practice with immediate feedback and coaching. Security professionals should form peer relationships, identify...
- Tools How to Design Security Warning Messages to Protect Users
Effective security warnings make the safest button most visible, stay brief while providing context, avoid technical jargon, and don't overwhelm users with repeated prompts. Microsoft's "Enable...