Security Cloud Privacy Tech

Tagged as 'Rant'

DRUGS!!! and IT Risk and Graphs

Many questions come along with the federal legalization of cannabis in Canada. It’s a massive example of trickle down risk as various controls around usage and methods of delivery are pushed into areas they weren’t designed for. Are you d...

Virtual Experiences & Content Delivery

Virtual events can be a great way to connect with your audience. They are not only less expensive to run but they are much easier to access for most people. So why are they rarely enjoyable despite having great content?

Communicating FOR Your Audience

When you’re trying to teach, pass along a message, or just generally reach anyone, the key is to understand how THEY want to consume information. That’s a huge gap in most communications today, especially breach notification. Put yoursel...

Evidence, Accusations, and Motivation

With the Bloomberg report on hardware hacking looking more in doubt, more and more politics are coming into play. Anytime you evaluate news, it’s important to look at things objectively. Here are a few tips around evaluating cybersecurity news.

Following Up On Tough News

Reflecting back on my keynote at SecTor in Toronto where I delivered some tough new to a roomful of security professionals. Here’s what worked and what could’ve been better!

How To Deliver Tough News

Sometimes you have to deliver really bad news. It’s not your fault, but you’re the one on the hook. How do you deliver it? How do you deliver it without getting mired into the downside?

What Do You Look To Get Out Of Conferences?

Conferences are usually jam packed with great content. So much so that it can be hard to prepare for them and get the most out of them. What do you look for in a conference? How can I help?

Security Is A Quality Issue

Security is a quality issue. Except we don’t treat it that way and that’s costing us dearly.

Cybersecurity Basics #12 – Bolt-on vs Built-in

Built-in security is always best. That’s “security by design” but when that fails (due to mistakes, oversight, humans), built-in security steps up…or, um, in.

Cybersecurity Basics #9 – Attack Attribution

Who did it? It’s a powerful question and the answer to “What is attack attribution?”

Cybersecurity Basics #4 – Perspective

Perspective is a tricky thing….maybe the hardest aspect of cybersecurity

Recharged, Reset, & Rocking

Back from vacation, I recap the show’s structure and new channels as well as the plan around “the basics”

« Previous Page
Next Page »