image from So, You're a Manager Now

So, You're a Manager Now

April 29, 2022

read more
image from A Mixtape in 2022

A Mixtape in 2022

February 4, 2022

read more
image from The Middle Path of Planning and Reflection

The Middle Path of Planning and Reflection

December 28, 2020

read more
image from Micromanagement and Trust

Micromanagement and Trust

July 31, 2020

read more
image from On Giving Advice

On Giving Advice

March 9, 2020

read more
image from Emergency Preparedness During Coronavirus Frenzy

Emergency Preparedness During Coronavirus Frenzy

March 5, 2020

read more
image from Mind Map Your Life

Mind Map Your Life

February 19, 2020

read more
image from Start With the Hard Part

Start With the Hard Part

October 25, 2019

read more
image from Delight in the Details

Delight in the Details

October 23, 2019

read more
image from Introducing ReThink Security

Introducing ReThink Security

August 21, 2019

read more
image from Newsletter & Recommendations

Newsletter & Recommendations

June 6, 2019

read more
image from Take a Moment

Take a Moment

June 3, 2019

read more
image from Triage Decision Making

Triage Decision Making

May 16, 2019

read more
image from Show Your Work

Show Your Work

April 26, 2019

read more
image from Getting Back Up

Getting Back Up

March 7, 2019

read more
image from Max Out vs. Continuous Development

Max Out vs. Continuous Development

February 28, 2019

read more
image from Mental Diet and Exercise

Mental Diet and Exercise

February 19, 2019

read more
image from Asking for Help Part 2 - Alerting

Asking for Help Part 2 - Alerting

February 4, 2019

read more
image from High Water Mark

High Water Mark

January 17, 2019

read more
image from Who Do You Want to Be

Who Do You Want to Be

January 11, 2019

read more
image from Presentation Tips

Presentation Tips

January 4, 2019

read more
image from Asking for Help

Asking for Help

January 2, 2019

read more
image from China Hijacking the Internet

China Hijacking the Internet

October 29, 2018

read more
image from Recording Audio with AirPods in Imovie

Recording Audio with AirPods in Imovie

September 6, 2018

read more
image from Active Decisions

Active Decisions

August 22, 2018

read more
image from Create/Publish Scripts

Create/Publish Scripts

August 8, 2018

read more
image from Specialize or Do Not Specialize

Specialize or Do Not Specialize

August 8, 2018

read more
image from Exactis Breach

Exactis Breach

July 26, 2018

read more
image from Optimizing Images

Optimizing Images

July 19, 2018

read more
image from What I Track

What I Track

July 3, 2018

read more
image from What I’m Thinking About May

What I’m Thinking About May

May 5, 2018

read more
image from What I’m Thinking About March

What I’m Thinking About March

March 2, 2018

read more
image from What I’m Thinking About January

What I’m Thinking About January

January 10, 2018

read more
image from Building a Collaborative & Social Application Security Program

Building a Collaborative & Social Application Security Program

October 9, 2017

read more
image from Lazy Days in the Cloud

Lazy Days in the Cloud

August 1, 2017

read more
image from Delegate Then Do

Delegate Then Do

July 11, 2017

read more
image from So you want to be a better programmer

So you want to be a better programmer

June 14, 2017

read more
image from Project Success

Project Success

June 9, 2017

read more
image from Don't Short Circuit a Lesson

Don't Short Circuit a Lesson

June 3, 2017

read more
image from Scale Your Solution to the Problem

Scale Your Solution to the Problem

May 30, 2017

read more
image from Digital Currencies

Digital Currencies

May 24, 2017

read more
image from Fortnightly

Fortnightly

July 27, 2016

read more
image from Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone

Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone

July 13, 2016

read more
image from In Defense of Reverse Engineering and Responsible Disclosure

In Defense of Reverse Engineering and Responsible Disclosure

September 3, 2015

read more
image from Ruby open allows command injection if user controlled

Ruby open allows command injection if user controlled

June 3, 2015

read more

New Mac Install Guide

November 8, 2014

read more

Understanding Customer Needs and Helping Them Mature

September 22, 2014

read more

My Experiences with IOS8 and Yosemite so far

July 26, 2014

read more

The Importance of Vulnerability Disclosure Programs and Bug Bounties

June 5, 2014

read more
image from My New Record Player and Beck - Morning Phase (The Vinyl Experience)

My New Record Player and Beck - Morning Phase (The Vinyl Experience)

March 27, 2014

read more
image from An Hour of Code with Code.org

An Hour of Code with Code.org

December 14, 2013

read more

Gmail Changes to Displays Images by Default

December 12, 2013

read more

Why I Donated to Help Jailbreak iOS7 & You Should Too

December 4, 2013

read more

Email Strategy

November 24, 2013

read more

Shutdown

October 3, 2013

read more

Anatomy of a Distributed Denial of Service (DDoS) Attack

April 3, 2013

read more

NASA Forced to Suspend All Public Outreach & Education Programs

March 23, 2013

read more

Joe_CMS Open Source!

November 8, 2012

read more

Mobile Application Security Testing FAQs: Post #1

August 20, 2012

read more

How Much Security Does Obfuscation Get You?

July 5, 2012

read more

Why Privacy Matters Even if You Have 'Nothing to Hide'

June 29, 2012

read more
image from What LinkedIn Should Have Done with Your Passwords

What LinkedIn Should Have Done with Your Passwords

June 6, 2012

read more

Constant Vigilance

May 21, 2012

read more

Boeing Paying Hackers to Break into Their Systems

May 14, 2012

read more

My Reading Cycle

May 7, 2012

read more

Developing Tools for Professional Hackers

April 30, 2012

read more

Finding Your Inner Evildoer (4/4): An Evil Streak

April 23, 2012

read more

Finding Your Inner Evildoer (3/4): A Good Imagination

April 16, 2012

read more

When to Rebuild Your Process from Scratch

April 9, 2012

read more

Finding Your Inner Evildoer (2/4): Complete Knowledge of the System

March 31, 2012

read more

Continuous Incremental, Personal Improvement

March 22, 2012

read more

Finding Your Inner Evildoer: Part 1

March 14, 2012

read more

CISCO Password Revealer

March 12, 2012

read more

Battling with Word and Excel

February 28, 2012

read more

Which is More Secure: Windows or Linux?

July 29, 2011

read more

The High Cost of an Application Security Data Breach

June 30, 2011

read more

Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config

April 25, 2011

read more

New WikiRater Features

April 18, 2011

read more

When is it OK to Build up Technical Debt

December 31, 2009

read more

Time Management with the Pomodoro Technique

October 8, 2009

read more

Manage Energy Not Time

October 2, 2009

read more

Goals, Results and Activities - defining your productivity

August 16, 2009

read more