My Writing
- Malware Key Challenges of Combating Malware in the Enterprise Enterprise malware defense is harder than single-host protection due to diverse business needs preventing consistent controls, geographic dispersement creating visibility gaps, political complexities...
- Career Stop Relying on Your Resume A resume gives employers what they need to reject you—designed to make you look like everyone else. If you promise to only use resumes late in the process, you'll motivate yourself to stand out...
- Social Networking Learning to Live with Social Networks: Risks and Rewards Social networking changed how organizations interact with customers and individuals communicate. Understanding user motivations is essential—it's hard to discuss securing social network interactions...
- Social Engineering When Targeted Attacks Aren't Targeted: The Magic of Cold Reading Mass-scale attacks feel targeted due to cold reading—like fortune tellers making generalized statements that seem specific. A fake UPS delivery notice works because many people actually sent...
- Career 10 Tips for Hiring Managers Seeking Information Security Professionals Hiring experienced security professionals is challenging—expect 45+ days for the process. Outline required technical and non-technical skills, distinguish "must have" from "nice to have," reach out...
- Social Networking Joining The Information Security Community on Twitter