My Writing
- Career Are Anxious People More Vigilant in Information Security? Research suggests nonanxious individuals may detect early warning signs of trouble better than anxious people, whose brains leap into action only after threats reach an obvious threshold. Calm...
- Risk Management The Risks of Remote Desktop for Access Over the Internet Exposing RDP to direct Internet connections is risky—beyond credential-guessing opportunities, critical vulnerabilities like CVE-2012-0002 can allow remote code execution without authentication....
- Career Hiring Strong Candidates for Information Security Roles
- Risk Management Why Are Executives More Prone to Accept Risks? Research links high status and power to greater trust in others and overconfidence in one's own knowledge. Executives may accept security risks while being overly trusting and without spending...
- Social Engineering An Example of SMS Text Phishing SMS phishing ('smishing') messages impersonate carriers like Verizon to direct victims to credential-harvesting websites using spoofed sender numbers and lookalike domains. Mobile users are...
- Career The Role of a Resume in an IT Job Search A resume primarily helps get past initial HR screening to reach the hiring manager—the real engagement happens afterward. Every bullet point should answer "So What?" by stating accomplishments rather...