My Writing
- Malware Wish-List for Endpoint Anti-Malware Products Endpoint security products should be unobtrusive by auto-tuning UI complexity based on user proficiency and only interrupting for critical alerts. They should baseline browsing patterns to flag...
- Privacy Teens on Formspring Are Redefining Privacy Norms Sites like Formspring encourage teens to answer personal questions that mirror password-reset security questions—favorite colors, restaurants, and pet names. As privacy norms change and more personal...
- Malware 4 Steps To Combat Malware Enterprise-Wide Enterprise malware defense follows four phases: Plan by understanding infection vectors and prioritizing targets; Resist using enterprise management systems to deploy controls at scale; Detect...
- Training Benefits of Learning in a Group
- Social Networking Security Scoreboard - "Yelp" for Enterprise Security Products?
- Social Networking When Bots Chat With Social Network Participants Scammers use compromised social network accounts for malicious chats—currently with human operators, but increasingly automated bots. Creating intelligent chat bots for Facebook is straightforward...