My Writing
- Social Engineering Deception Lessons for Information Security from World War II WWII deception used ambiguity (uncertainty inhibiting intelligence assessments) and misleading approaches (building up wrong alternatives' attractiveness). Successful deception resembles jigsaw...
- Training Make Security Policies Harder to Read to Improve Retention?
- Product Management Ease of Use as a Competitive Advantage for Security Products Security products historically prioritized features over usability. Vendors should prompt users as last resort, make intelligent decisions on users' behalf, and let products run unobtrusively—users...
- Social Networking Predicting 2011 Information Security Trends
- Social Networking Antivirus Vendors Consider Facebook Activity Protection Antivirus vendors are experimenting with Facebook apps (Norton Safe Web, BitDefender Safego) that review links shared on users' walls for malware. These run on vendor infrastructure using Facebook's...
- Career Depth of Knowledge in IT Is Not Enough Knowing technical syntax isn't enough—the Internet knows more reference information than you. Depth of knowledge combined with good judgment or nuanced insight is truly valuable. Learn to make...