Exactis Breach
I recently learned about a new Exactis data breach. No passwords were compromised, but much of the information that would be used in a social engineering or phishing campaign wa...
What I Track
I’ve recently added basic Google Analytics tracking to this site. This is just to give me a sense of how many people are looking at my site and to understand what articles and t...
What I’m Thinking About May
Safety, Security, and Privacy Safety, Security, and Privacy continue to be merged together as IoT increases its reach into new devices. IoT devices are being develope with littl...
What I’m Thinking About March
Lots of lost certificates 23,000 HTTPS certificates axed after CEO emails private keys | Ars Technica The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller o...
Building a Collaborative & Social Application Security Program
It’s no secret that more and more companies are jumping on the Bug Bounty Program band wagon, and for good reason, there is a lot of value to be had there. However, rolling out ...
Lazy Days in the Cloud
The cloud brings scalability, reliability and security features that allow companies of all sizes to run their online business efficiently. These powerful capabilities often bri...
Digital Currencies
I recently got interested in Digital Currencies, such as Bitcoin and others and decided to start learning about what they were, why they’re interesting, and how to invest. There...
Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone
Viral Game Highlights Calls Attention to Timeless Security Debate I want to run into traffic, fall into a pond, catch Pokémon while my wife is in labor, and find ...