My Writing
- Cheat Sheets How to Use the Security Architecture Cheat Sheet for Internet Applications
- Training Professional Certifications and the Seductive Power of Similarity Professional certifications act as similarity signals that help people "click"—research shows shared traits (same first name, hometown, interests) double connection likelihood. More exclusive...
- Social Networking Information Security and Social Media Marketing Campaigns Social media marketing creates security challenges: marketers need social network access (greater risk exposure), fast-changing campaigns may spawn uncontrolled satellite web servers, brand...
- Malware What is an Exploit Kit? Exploit kits are toolkits that automate exploitation of client-side vulnerabilities, targeting browsers and plugins like Adobe Reader, Java, and Flash. Key characteristics include ease of use by...
- Incident Response CyberForensics: Understanding Information Security Investigations
- Social Engineering Social Engineering and Mirroring the Emotional State Effective social engineers are "high self-monitors"—they subconsciously pick up social cues and adjust their presentation, identifying topics of interest, appearing non-threatening through nonverbal...