My Writing
- Leadership Saying Something Nice About Information Security
- Training Psychological Similarities Between Shoplifting and Malicious Hacking Studies suggest 60% of consumers have shoplifted at some point—most are amateurs who steal sporadically. Shoplifters report excitement from adrenaline, superiority over store clerks, and belonging to...
- Malware Can We Rely on the Antivirus' Ability to Disinfect a System? When antivirus detects malware that already executed, clicking "Remove" and moving on is tempting but risky. Other undetected malware may remain, or attackers may have already expanded their...
- Malware How Antivirus Vendors Describe Their Cloud Capabilities Cloud antivirus uses lightweight endpoint agents that send file details to provider infrastructure for analysis, allowing the broader user community to benefit from processed data. Major vendors...
- Incident Response How a Data Security Breach Can Be Used for Good PR Hershey turned a website breach into positive PR by emphasizing that the attacker only modified a single baking recipe. Headlines focused on the quirky detail rather than consumer data exposure....
- Malware Analysis Virtualized Network Isolation for a Malware Analysis Lab Default VMware host-only networking allows the physical host to interact with virtualized lab systems through a virtual adapter. For better isolation, create a dedicated virtual network (e.g.,...