My Writing
- Social Networking Learning to Live with Social Networks: Risks and Rewards Social networking changed how organizations interact with customers and individuals communicate. Understanding user motivations is essential—it's hard to discuss securing social network interactions...
- Social Engineering When Targeted Attacks Aren't Targeted: The Magic of Cold Reading Mass-scale attacks feel targeted due to cold reading—like fortune tellers making generalized statements that seem specific. A fake UPS delivery notice works because many people actually sent...
- Career 10 Tips for Hiring Managers Seeking Cybersecurity Professionals Security roles stay open for 45+ days, often because the hiring manager hasn't done the preparation that separates a good hire from a fast one. Most of that work happens before the first interview.
- Social Networking Joining The Information Security Community on Twitter
- Career How to Research in Preparation For an IT Interview Research interviewers and positions before IT job interviews. Insist recruiters provide more than generic postings; tap LinkedIn to find company employees in your network. Search for former employees...
- Assessments Dealing with Misinformation During Security Assessments and Forensic Investigations Interview subjects don't always provide accurate information—they may not know details, remember incorrectly, or have incentives to mislead. Look for discrepancies between sources, ask similar...