My Writing
- Risk Management First Impression Tips for Security Startups Making a good first impression requires researching prospects before contact, establishing credibility by demonstrating relevant experience, and customizing elevator pitches to the listener's...
- Risk Management Information Security Measures Commensurate With Risky Behavior Security safeguards could be applied selectively based on users' demonstrated tendency toward risky computer behavior—people whose systems were frequently infected or who clicked simulated phishing...
- Malware Analysis Questions for Endpoint Security Startups Evaluating an endpoint security startup requires understanding its relationship to antivirus, its technological competitors, and how it competes for customers' budgets and time. Key questions address...
- Assessments Experts Cannot Help Overstating Their Expertise Self-proclaimed experts are more likely to claim knowledge of things they don't know, including nonexistent terms in their fields of expertise. This overclaiming tendency means security professionals...
- Authentication Face Recognition and Locking Your System: You Say Goodbye and I Say Hello Facial recognition login features like Windows Hello can automatically unlock a computer moments after you've locked it if the camera spots your face. Implementing a slight delay before facial...
- Networking A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers PayPal overpayment scams target Craigslist sellers using fake payment notifications that ask victims to wire funds to a third-party "pickup agent." Scammers craft stories about working in rural areas...