whoisjoe.com

Security, people, process, and resilient software.

83 published stories
Scale Your Solution to the Problem

Scale Your Solution to the Problem

It’s important to Scale your solution to the problem at hand vs. trying to scale the problem to your solution. By analogy a master photographer knows when to pull out her iPhone...

Digital Currencies

Digital Currencies

I recently got interested in Digital Currencies, such as Bitcoin and others and decided to start learning about what they were, why they’re interesting, and how to invest. There...

Fortnightly

Fortnightly

Sorry biweekly, you’ve just been ejected from my vocabulary. I hate to be esoteric in my language and use a word like fortnightly, but when your definition from Merriam Webster ...

Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone

Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone

Viral Game Highlights Calls Attention to Timeless Security Debate I want to run into traffic, fall into a pond, catch Pokémon while my wife is in labor, and find ...

In Defense of Reverse Engineering and Responsible Disclosure

In Defense of Reverse Engineering and Responsible Disclosure

I was pretty disappointed after reading Mary Ann Davidson’s blog post discouraging customers from reverse engineering their software for any reason. As CSO of Oracle, one of the...

Ruby open allows command injection if user controlled

Ruby open allows command injection if user controlled

We’ve been getting a lot of Ruby on Rails Penetration tests and code reviews at Security Innovaiton, and I’ve been writing a decent amount of it myself. In general it’s a great ...

An Hour of Code with Code.org

An Hour of Code with Code.org

I am staggered and truly impressed by what the team at Code.org has accomplished in such a short period of time. When Hadi Partovi started conversations in May of this year with...

Hero

New Mac Install Guide

This guide may help you install some required and some helpful settings on a new mac. I originally wrote this for my company, Security Innovation, where we have very strict comp...

Hero

Understanding Customer Needs and Helping Them Mature

(Originally posted on the Security Innovation Blog) ##Security Innovation’s manifesto on being a trusted advisor Each client has different backgrounds as well as a different dep...

Hero

My Experiences with IOS8 and Yosemite so far

I’ve been running iOS8 and Yosemite for a while now, (since early beta, actually). There were some real challenges in the early betas, but the latest version is pretty solid, bu...