My Writing
- Malware My Upcoming Presentations: Career, Malware, Social Media
- Training Traits of a Good Manager of an Information Technology Team Technical expertise rarely correlates with management ability. Google research found employees valued even-keeled bosses who made time for one-on-ones, helped puzzle through problems by asking...
- Leadership 7 Inconvenient Truths for Information Security Employees use personal devices for work, reuse passwords, write credentials down, click on links, and disable security software. Acknowledging these common behaviors as reality rather than pretending...
- Risk Management Turning Information Security Architects into Chefs Some architects rigorously follow frameworks (recipe-diehards); others improvise based on experience. Neither approach alone suffices. True architects know design patterns and control frameworks for...
- Career 6 Tips for Hiring and Working With Security Consultants Before engaging security consultants, understand your requirements to stay in control. Reach out to multiple firms for perspectives and price validation, assess who specifically will work on the...
- Malware Evolving Threats: The Long Tail of Potential Data Breach Victims The "long tail" of potential breach victims—numerous SMBs comprising 80% of the population—attracts attackers who prefer quantity over quality. These targets have weaker defenses and there are many...