Control Your Meetings…Or Someone Else Will

As a Meeting Leader, it's your job to keep your meetings on track and be able to hear any dissent. Use these tips to help you create that environment.

Useful Cryptography

I didn't realize until I started studying for the Security+ that my foray into writing notes in code in middle school was actually my first exposure to cryptography.

The New York Times, The FCC and Net Neutrality

Why is the FCC claiming that releasing information that is already publicly available would jeopardize its system security?

Want Better Security? Try Crowdsourcing Your Security Controls!

Relegating the establishment of security controls to a small team of Risk Management experts leads to glaring holes in your Risk Register. Opening up your Risk Register to more perspectives gives you more comprehensive security.

To Friend or Not to Friend (On Facebook)

Is adding your colleagues to your Facebook a bigger risk or reward? I share my experiences and give some advice on how to proceed.

The Intersection of Organizational Threats and Process Design

What does Cybersecurity and Network Defense have to do with Process Design and Organizational Operations? A Whole Lot....

Why Certify? CompTIA Security+

There is a certain reductionist fallacy running wild within the technology world of late. This idea informs a lot of policy not only within the economy, but also within the business world. This fallacy has allowed the proliferation of Coding Boot Camps, the latest panacea for anyone desperate for a job, many of which are ...

Learn More