Home
Essays
About
Search
Current & archived essays
A list of all the essays and talks on the site, including
archived
content.
10-Apr-2025
Security is a service business...one star
17-Mar-2025
Let's Talk Cloud
14-Mar-2025
Mornings with Mark
13-Mar-2025
My years on CBC
10-Feb-2025
Helping people get the most out of AWS re:Invent
01-Apr-2023
The Failure of the Most Desirable Security Control Ever
14-Dec-2022
ChatGPT Delivers Ideas and Answers on Demand, If You Know How To Ask
02-Dec-2022
AWS re:Invent 2022 Attendee Guide: Security
01-Dec-2022
Accelerating innovation at AWS Security
01-Dec-2022
Werner Vogels Keynote Play-by-play
30-Nov-2022
Ruba Borno AWS Partner Keynote Play-by-play
30-Nov-2022
Swami Sivasubramanian Keynote Play-by-play
29-Nov-2022
Adam Selipsky Keynote Play-by-play
28-Nov-2022
Monday Night Live With Peter DeSantis
28-Nov-2022
New Features That Will Help You Build Better From Day One at AWS re:Invent
28-Nov-2022
The Five Most Interesting AWS (p)re:Invent Announcements for Cloud Security
25-Nov-2022
Mastodon's Promising Federated Approach Will Frustrate You More Than Twitter
09-Oct-2022
Has the EU Finally Made the U in USB-C Actually Stand for Universal?
26-Aug-2022
Why is it so hard to law enforcement to track down harassers?
21-Aug-2022
The Ultimate Guide to AWS re:Invent 2022
07-Aug-2022
Canadians Are Reliant on Rogers Whether We Like It or Not
24-Jun-2022
It’s Official, Serverless Is Now Meaningless and That’s...Ok?
22-Jun-2022
Is Google LaMDA Sentient?
08-Apr-2022
Twitter To Add Edit Button...Finally
06-Feb-2022
NFTs, Web3, and The Blockchain Have Their Place…Maybe
05-Feb-2022
Hype & Money Are Testing The Idea of NFTs
04-Feb-2022
Why Multi-Factor Authentication Is Critical To Stopping Hackers From Getting Into Your Accounts
03-Feb-2022
What Is A Bug Bounty And Why Are They Important?
02-Feb-2022
A 326 Million Dollar Smart Contract Bug
01-Feb-2022
Why Do Amazon S3 Data Breaches Keep Happening?
31-Jan-2022
Can You Own A Colour? Can You Try?
30-Jan-2022
The Number One Problem With Web3 Smart Contracts
29-Jan-2022
Is A Bug In A Web3 Smart Contract Part of the Contract?
28-Jan-2022
When Is a Hacker Not a Hacker?
27-Jan-2022
If Apple’s FaceID Works With Masks On, Will That Reduce Your Security?
26-Jan-2022
Why You Should Build Less, Not More
25-Jan-2022
An Uncomfortable Admission On Work
24-Jan-2022
Is Digital Privacy Important?
23-Jan-2022
How To Explain Complex Technology Topics To A Broad Audience
22-Jan-2022
Risk Analysis (And Essays) Shouldn’t End in “Um”
21-Jan-2022
How Can You Figure out How Likely an App Is to Have Security Problems?
20-Jan-2022
How The App Privacy Card in the Apple App Store Matters To You
19-Jan-2022
Despite 5G’s Capabilities, Mobile Providers Can’t Connect With Airline Industry
19-Jan-2022
Do You Care About Data Privacy? Does Anyone?
18-Jan-2022
Encryption Is Good For You and Your Community
17-Jan-2022
Would You Put Your Security in the Hands of a Guess?
16-Jan-2022
What Is Risk?
15-Jan-2022
Security Challenges With NFTs
14-Jan-2022
You Just Bought An NFT, What Did You Actually Buy?
13-Jan-2022
What Are Blockchain, Web3, and NFTs?
12-Jan-2022
Meeting Goals With Feedback Loops
11-Jan-2022
Your Goal In Building Something With Technology
10-Jan-2022
Digital Privacy Is All About Choice
09-Jan-2022
Stop Focusing on Stopping Hackers and Cybercriminals
08-Jan-2022
Why Aren’t Security and Privacy Part of the Foundation of Technology?
13-Dec-2021
Can We Improve How IDT Stored Secrets in AWS in 2017?
06-Dec-2021
Can We Improve How iRobot Deployed Microservices in 2017?
02-Dec-2021
Stephen Schmidt's Security Leadership Session at AWS re:Invent 2021
02-Dec-2021
Werner Vogel's Keynote at AWS re:Invent 2021
02-Dec-2021
How To Build Streaming Media Solutions In The AWS Cloud
01-Dec-2021
Opinions my own: Corey Quinn & Bill Vass
01-Dec-2021
Peter DeSantis' Keynote at AWS re:Invent 2021
01-Dec-2021
Swami Sivasubramanian's Keynote at AWS re:Invent 2021
30-Nov-2021
A First Look At The Brand New Amazon Inspector
30-Nov-2021
Adam Selipsky's Keynote at AWS re:Invent 2021
29-Nov-2021
AWS Re-launches Amazon Inspector To Find Software Vulnerabilities
29-Nov-2021
The Top AWS re:Invent Announcements
26-Nov-2021
Getting The Most Out of AWS re:Invent Remotely
26-Nov-2021
Performance Efficiency in the AWS Well-Architected Framework
26-Nov-2021
The Ultimate Guide to AWS re:Invent 2021
25-Nov-2021
Reliability in the AWS Well-Architected Framework
25-Nov-2021
How (not)? to move a security practice to the cloud
24-Nov-2021
Cost Optimization in the AWS Well-Architected Framework
24-Nov-2021
Updating your security practice for the cloud, step-by-step
23-Nov-2021
Security in the AWS Well-Architected Framework
22-Nov-2021
Operational Excellence in the AWS Well-Architected Framework
22-Nov-2021
Can We Improve How Airbnb Tested Their Amazon RDS Databases in 2017?
19-Nov-2021
AWS Data Wrangler
19-Nov-2021
Smithy
18-Nov-2021
Amazon API Gateway Serverless Developer Portal
18-Nov-2021
Amazon S3 Glacier Re:Freezer
17-Nov-2021
Amazon QuickSight Embedding SDK
17-Nov-2021
AWS Perspective
16-Nov-2021
AWS WAF Security Automations
16-Nov-2021
Gluon TS (Time Series)
15-Nov-2021
AWS Deployment Framework
15-Nov-2021
AWS Lambda Powertools (Python)
15-Nov-2021
Can We Improve How Station X Processed Genomics Data on AWS in 2017?
15-Nov-2021
The Infinite Loop of Lost Potential
12-Nov-2021
Avoiding overload in distributed systems by putting the smaller service in control
11-Nov-2021
Automating safe, hands-off deployments
10-Nov-2021
Fairness in multi-tenant systems
10-Nov-2021
This One Mistake Will Stop a DevSecOps Shift Left Strategy Dead in Its Tracks
09-Nov-2021
Making retries safe with idempotent APIs
08-Nov-2021
Timeouts, retries, and backoff with jitter
08-Nov-2021
Can We Improve How Capital One Enforced Policies in AWS with Cloud Custodian in 2017?
05-Nov-2021
Machine Learning Best Practices for Public Sector Organizations
04-Nov-2021
AWS Serverless Multi-Tier Architectures with Amazon API Gateway and AWS Lambda
03-Nov-2021
NIST Cybersecurity Framework
02-Nov-2021
Reactive Systems on AWS
01-Nov-2021
AWS re:Invent 2021
01-Nov-2021
AWS re:Invent Security Attendee Guide 2021
01-Nov-2021
Practicing Continuous Integration and Continuous Delivery on AWS
01-Nov-2021
Can We Improve How New Relic Built Their Terraform in 2017?
01-Nov-2021
AWS re:Invent Announcements
25-Oct-2021
Facebook Sets Out To Build The Multiverse...and Hopes To Hide There
25-Oct-2021
Can We Improve How CorpInfo handled IoT Events in 2017?
21-Oct-2021
Stop your password from opening the door to hackers
18-Oct-2021
Can We Improve How Civitas Learning Batch Processed PII in 2017?
11-Oct-2021
Can We Improve How FT.com Got Developers To Focus on Costs in 2017?
06-Oct-2021
Can We Improve How Netflix Handled Failover Using DNS In 2017?
06-Oct-2021
Streaming Giant Twitch Hit by Major Data Breach
05-Oct-2021
Lessons in Designing Blast Radius The Hard Way; One Mistake Crashes Facebook For Hours
04-Oct-2021
Can We Improve How Lyft Handled Service Discovery on AWS In 2016?
29-Sep-2021
Instagram delays launch of app for kids
15-Sep-2021
How to build strong security guardrails in the AWS Cloud with minimal effort
07-Sep-2021
How To Run Just One Container With AWS App Runner…Hopefully
02-Sep-2021
How a New User Can Run Just One Container in the AWS Cloud…Maybe
25-Aug-2021
What AWS re:Inforce 2021 Means for Cloud Security…and Cybersecurity in General
06-Aug-2021
Microsoft Edge Experiment 'Super Duper Secure Mode' Aims To Reduce Openings for Hackers
04-Aug-2021
US Federal Government Cybersecurity is Lacking
04-Aug-2021
Lazio & BlackMatter Bring Ransomware Into the Spotlight…Again
02-Aug-2021
Hackers Attempt To Extort Electronic Arts (EA), Fail, Then Leak Source Code
23-Jul-2021
Twitter Shows Slow MFA Adoption, Is Security Unusable?
21-Jul-2021
Pegasus Spyware Runs Roughshod over Human Rights
19-Jul-2021
US Government Puts Cybersecurity Front and Center
16-Jul-2021
New Ransomware Resources For Defenders
14-Jul-2021
REvil-ed Ransomware Group Goes Kaput?
12-Jul-2021
Ransomware Attack On Kaseya Still Very Real For Victims
09-Jul-2021
Microsoft Windows PrinterNightmare Patch Highlight “Unperfect” Security Decisions
07-Jul-2021
REvil Ransomware Criminals Look To Maximize Q3 Profits With Kaseya Attack
06-Jul-2021
What Makes Ransomware Successful and Why It Won't Ever Really Stop
05-Jul-2021
These Real Apps On Google Play Are Harvesting Facebook Logins
02-Jul-2021
Windows Is Having a PrinterNightmare and Can’t Wake Up
30-Jun-2021
Will Windows 11 Helps Advance PC Security?
25-Jun-2021
Hackers Delete Home Backups Remotely (WD My Book Live Flaw)
23-Jun-2021
Should Apple Allow 'Sideloading' Apps on My iPhone?
21-Jun-2021
Does Your Utility Control Your Smart House?
10-Jun-2021
Privacy at WWDC21
04-Jun-2021
Apple vs. Facebook Battling For Your Privacy
21-May-2021
RSAC 2021
17-May-2021
Mark Nunnikhoven | CUBE Conversation May 2021
10-May-2021
What You Need To Know About the Colonial Pipeline Attack
07-May-2021
Top Recommendations for Working with IAM from Our AWS Heroes – Part 4: Available Permissions and User Identity
03-May-2021
Ten Years of Cloud Security
03-May-2021
What Do You Want To Learn?
30-Apr-2021
Google Gathers FLoC of Privacy Bull
26-Apr-2021
Stop Apps From Tracking You in iOS 14.5...Mostly
01-Apr-2021
Ubiquiti Breach Is a Case Study in How NOT to Communicate After a Hack
30-Mar-2021
No Privacy With Google Chrome on iOS
29-Mar-2021
Update Your iPhone Now...Again (iOS 14.4.2)
19-Mar-2021
Adding Guardrails To A Cloud Account After The Fact
09-Mar-2021
Update Your iPhone Now (iOS 14.4.1)
17-Feb-2021
Clubhouse's Entirely Predictable Privacy and Moderation Issues
16-Feb-2021
Security and Privacy Are Linked
28-Jan-2021
Major Ransomware Services Busted
13-Jan-2021
Parler Pas: Fringe Social Network Offline
15-Dec-2020
AWS re:Invent 2020, Week Three
07-Dec-2020
AWS re:Invent 2020, Week Two
06-Dec-2020
Building Event Driven Applications With Amazon EventBridge
04-Dec-2020
Monitoring Production Services at Amazon
04-Dec-2020
Security Best Practices the AWS Well-Architected Way
03-Dec-2020
Politicians Playing Among Us
01-Dec-2020
Andy Jassy Keynote, AWS Re:Invent 2020
30-Nov-2020
AWS re:Invent 2020, Week One
30-Nov-2020
AWS re:Invent 2020
30-Nov-2020
Mistakes were made, lessons were learned
28-Nov-2020
Passwords Suck
25-Nov-2020
AWS re:Invent Hot Takes
11-Nov-2020
The Ultimate Guide to AWS re:Invent 2020
23-Sep-2020
How AI Could Help Ease Your Zoom Fatigue
19-Aug-2020
Legacy Authentication Risks
08-Aug-2020
The goal of cybersecurity
06-Aug-2020
The Help Desk Is a Key to Incident Response
31-Jul-2020
2020 AWS re:Invent Ultimate Guide
28-Jul-2020
Should I Worry About TikTok?
17-Jul-2020
Dumpster Fire
30-Jun-2020
Applying the Well-Architected Framework, Small Edition
25-May-2020
The New Office: Home?
06-May-2020
The Unicorn Project through a security lens
30-Apr-2020
Stop Drowning Online During Isolation
28-Apr-2020
Let's Talk Cloud - Season 2
28-Apr-2020
#LetsTalkCloud: The Unicorn Project Principles
21-Apr-2020
#LetsTalkCloud: Executives vs. Engineers
20-Apr-2020
Zoom.us and Practical Cybersecurity
15-Apr-2020
Contact Tracing via Smartphones
15-Apr-2020
Risk decisions in an imperfect world
14-Apr-2020
#LetsTalkCloud: The Security of Software
07-Apr-2020
#LetsTalkCloud: Finding Security
31-Mar-2020
#LetsTalkCloud: Transformations In The Cloud
24-Mar-2020
#LetsTalkCloud: We're Back
07-Feb-2020
Smartphone Addiction
09-Jan-2020
Privacy at CES 2020
02-Jan-2020
New Rules for Youtube
17-Dec-2019
Digital ID in Canada
10-Dec-2019
Let's Talk Cloud - Season 1
10-Dec-2019
#LetsTalkCloud: AWS re:Invent 2019 re:Cap
08-Dec-2019
All Things AWS re:Invent 2019
02-Dec-2019
#LetsTalkCloud: AWS re:Invent 2019 Kick-Off
02-Dec-2019
Strong security made simple
28-Nov-2019
Protecting Yourself Black Friday Scams Online
27-Nov-2019
Road to re:Invent - AWS Machine Learning
26-Nov-2019
#LetsTalkCloud: Open Source Risks
23-Nov-2019
Data Retention in Canada
19-Nov-2019
#LetsTalkCloud: Containers v1.1 ;-)
13-Nov-2019
Road to re:Invent - AWS Compute
12-Nov-2019
#LetsTalkCloud: Misconfigurations & Scale
07-Nov-2019
When cyber attacks
05-Nov-2019
Catching Distracted Drivers With Technology
04-Nov-2019
#LetsTalkCloud: Real World Problems
01-Nov-2019
Road to re:Invent - Amazon DynamoDB Redemption
30-Oct-2019
Road to re:Invent - AWS Databases
18-Oct-2019
Biometrics and Bugs
17-Oct-2019
Road to re:Invent - Mistakes and Misconfigurations
15-Oct-2019
Road to re:Invent - Reserved Seating Opening
15-Oct-2019
3 Years of Serverless Security
08-Oct-2019
The sky is falling run
07-Oct-2019
Road to re:Invent - What Is Serverless
03-Oct-2019
Advanced security automation made simple
02-Oct-2019
Road to re:Invent - Amazon Athena and Quicksight
30-Sep-2019
Road to re:Invent - Amazon S3
26-Sep-2019
E-transfer Security
25-Sep-2019
Road to re:Invent - The Shared Responsibility Model
23-Sep-2019
Road to re:Invent - Intro to the AWS CLI
20-Sep-2019
Road to re:Invent - Intro to AWS Lambda
17-Sep-2019
Road to re:Invent - Kick Off
11-Sep-2019
Retargeting In Online Politics
05-Sep-2019
Cybersecurity Patching in Context
26-Aug-2019
Business Email Compromise
21-Aug-2019
Privacy Expectations
16-Aug-2019
NULL & Input Validation
12-Aug-2019
AppSec Is Dead
19-Jul-2019
FaceApp: Relax You're Just Old (Now)
16-Jul-2019
10x Engineers
11-Jul-2019
Zoom.us & The Real Cybersecurity Problem
09-Jul-2019
NBA Free Agency vs Security Policies
08-Jul-2019
Update On Mornings With Mark
05-Jun-2019
Cybersecurity Motivations
04-Jun-2019
Apple WWDC Privacy Update
28-May-2019
Web Browser Privacy
23-May-2019
Nest, IoT, and Your Privacy
21-May-2019
Huawei, Android, and Cybersecurity
09-May-2019
Porn & Digital Identity
07-May-2019
Borders & Cybersecurity
01-May-2019
Facebook's F8 & Information Management
30-Apr-2019
James Harden & Cybersecurity Policy
30-Apr-2019
The Ultimate Guide to AWS re:Invent 2019
26-Apr-2019
Cybersecurity Time Crunch
23-Apr-2019
Facial Recognition Consent
18-Apr-2019
Facebook's Security Fail
16-Apr-2019
Metadata Trails
11-Apr-2019
Perfectionism In Tech
09-Apr-2019
Serverless Is An Ops Model
04-Apr-2019
Cybersecurity & Technical Debt
02-Apr-2019
Exposing Secrets In Code
21-Mar-2019
Stadia & Secure Access Design
19-Mar-2019
Cybersecurity Needs Coders
14-Mar-2019
Cloud Costs & Security
12-Mar-2019
Services & Privacy Perceptions
07-Mar-2019
The Cybersecurity Industry
28-Feb-2019
Warrant Canaries
26-Feb-2019
Secret App Telemetry
21-Feb-2019
Your Child's Digital Identity
19-Feb-2019
DNS Hijacking
14-Feb-2019
Terms of Service
12-Feb-2019
Canadian Election Cybersecurity
07-Feb-2019
Cybersecurity Research Consequences
05-Feb-2019
Cryptocurrencies & Cybercrime
31-Jan-2019
Facebook & The Value of Privacy
29-Jan-2019
GDPR Intentions
24-Jan-2019
Facebook's 10 Year Challenge
22-Jan-2019
Zero vs. Lean Trust
17-Jan-2019
773M Credentials
15-Jan-2019
Konmari Your Data
10-Jan-2019
Tracking Smartphone Data
08-Jan-2019
Setting Up 2019
19-Dec-2018
Squad Goals
17-Dec-2018
On The Importance Of Names
14-Dec-2018
Unexpected Lessons
11-Dec-2018
Law and The Internet
10-Dec-2018
Security Metrics 🗑🔥
07-Dec-2018
Fortnite, A Service Delivery Example
06-Dec-2018
Australia, Huawei, Apple, and the Government of Canada
05-Dec-2018
Delivering Information With Context
20-Nov-2018
Communication At Scale
19-Nov-2018
Preparation Is Key
09-Nov-2018
Signals And The Data Explosion
08-Nov-2018
You Can't Blame 'Em
07-Nov-2018
Optimize Your Tools
06-Nov-2018
The Internet Is Forever
05-Nov-2018
Politics & Attack Attribution
02-Nov-2018
Master Your Tools
01-Nov-2018
Know Your Audience
31-Oct-2018
Automating Your Job
30-Oct-2018
Refreshing Your Perspective
26-Oct-2018
Building On Trust
25-Oct-2018
Building On Fragile Layers
23-Oct-2018
Keep Decisions Up To Date
23-Oct-2018
Keep Decisions Up To Date
22-Oct-2018
User Experience Is Critical
22-Oct-2018
User Experience Is Critical
19-Oct-2018
The War Room
19-Oct-2018
The War Room
18-Oct-2018
Being An Educated Social Media User
18-Oct-2018
Being An Educated Social Media User
17-Oct-2018
DRUGS!!! and IT Risk and Graphs
17-Oct-2018
DRUGS!!! and IT Risk and Graphs
16-Oct-2018
Virtual Experiences & Content Delivery
16-Oct-2018
Virtual Experiences & Content Delivery
15-Oct-2018
Communicating FOR Your Audience
15-Oct-2018
Communicating FOR Your Audience
12-Oct-2018
Facebook...ugh...%$&#ing, Facebook
12-Oct-2018
Facebook...ugh...%$&#ing, Facebook
11-Oct-2018
Google+ & Infrastructure Monitoring
11-Oct-2018
Google+ & Infrastructure Monitoring
09-Oct-2018
Evidence, Accusations, and Motivation
09-Oct-2018
Evidence, Accusations, and Motivation
05-Oct-2018
Bloomberg, Supermicro, and Hardware Supply Chain Attacks
05-Oct-2018
Bloomberg, Supermicro, and Hardware Supply Chain Attacks
04-Oct-2018
Following Up On Tough News
04-Oct-2018
Following Up On Tough News
03-Oct-2018
How To Deliver Tough News
03-Oct-2018
How To Deliver Tough News
02-Oct-2018
National Cybersecurity Awareness Month
02-Oct-2018
National Cybersecurity Awareness Month
02-Oct-2018
Are we setup to fail?
01-Oct-2018
50 Million Facebook Accounts Hacked?!?
28-Sep-2018
Facebook, Shadow Profiles, & Data Brokers
27-Sep-2018
End-to-end Encryption & WhatsApp
26-Sep-2018
Amazon Alexa Everywhere
21-Sep-2018
What Do You Look To Get Out Of Conferences?
18-Sep-2018
Security Is A Quality Issue
17-Sep-2018
The Basic Basics
14-Sep-2018
Cybersecurity Basics #12 - Bolt-on vs Built-in
13-Sep-2018
Cybersecurity Basics #11a - Risk Assessments Redux
12-Sep-2018
Cybersecurity Basics #11 - Risk Assessments & Pen Tests
07-Sep-2018
Family Locator Apps
07-Sep-2018
Cybersecurity Basics #10 - Personally Identifiable Information
06-Sep-2018
Cybersecurity Basics #9 - Attack Attribution
05-Sep-2018
Cybersecurity Basics #8 - Authentication, Authorization, & Need To Know
04-Sep-2018
Cybersecurity Basics #7 - Hackers & Cybercriminals
29-Aug-2018
Cybersecurity Basics #6 - Malware
28-Aug-2018
Cybersecurity Basics #5 - Encryption
27-Aug-2018
VPNs
27-Aug-2018
Cybersecurity Basics #4 - Perspective
23-Aug-2018
Cybersecurity Basics #3 - Passwords
22-Aug-2018
Cybersecurity Basics #2 - Vulnerabilities, Exploits, and Threats
21-Aug-2018
Cybersecurity Basics #1 - The Goal
20-Aug-2018
G Suite for Education
20-Aug-2018
Recharged, Reset, & Rocking
10-Aug-2018
The Basics
08-Aug-2018
Operational Security
07-Aug-2018
3d Printing
02-Aug-2018
Easy To Use Tools
01-Aug-2018
Learning From Failure
31-Jul-2018
Toxicity & Security's Responsibility
30-Jul-2018
Discussions At Scale
30-Jul-2018
Deep Fakes: Was That Real
27-Jul-2018
HR Challenges & Getting Your First Security Role
26-Jul-2018
Security Keys, UX, & Reasonable Choices
25-Jul-2018
Constant Negative Pressure
24-Jul-2018
Assumptions & Outdated Mental Models
23-Jul-2018
Getting Started In Security: Post Certification
22-Jul-2018
Smartphone Addiction Intended Consequence
20-Jul-2018
Remote Work, Cubes, & Everything In Between
19-Jul-2018
Balance & Burnout
16-Jul-2018
Facial Recognition Discussion Required
16-Jul-2018
Ignorance & Risk
12-Jul-2018
Document, Automate, Repeat
11-Jul-2018
Cybersecurity: Getting Past HR
10-Jul-2018
🧠 A.I. In Context
09-Jul-2018
Fortnite a Good Example
09-Jul-2018
Fortnite, UI Patterns, and Desired Behaviours
03-Jul-2018
Google Duplex Are We Ready
28-Jun-2018
Working Together To Improve Security
27-Jun-2018
Security Thinking Is Service Design Thinking
26-Jun-2018
Don't Trust The Network
25-Jun-2018
Tanacon, Security, and Lack of a Threat Model
21-Jun-2018
Culture Change Is Hard
19-Jun-2018
Ethics And Action In Technology
18-Jun-2018
Ethics In Technology And Cybersecurity
15-Jun-2018
Getting Started In Cybersecurity & Perspective
14-Jun-2018
Apple, Graylock, And Context
13-Jun-2018
Google In Schools
12-Jun-2018
Cryptocurrency & High Value Targets
11-Jun-2018
Net Neutrality
07-Jun-2018
Apple, WWDC, and Your Privacy
07-Jun-2018
Apple, WWDC, and Your Privacy
05-Jun-2018
Developer Workflow 101
05-Jun-2018
Security in Devops
05-Jun-2018
Developer Workflow 101
05-Jun-2018
Security in a devops world
04-Jun-2018
Transparency & Backpedaling
04-Jun-2018
Transparency & Backpedaling
01-Jun-2018
Why Can't Security Play Nice With Others?
01-Jun-2018
What's In A Name?
01-Jun-2018
What's In A Name?
01-Jun-2018
Why Can't Security Play Nice With Others?
30-May-2018
Information Security vs. Cybersecurity
30-May-2018
Information Security vs. Cybersecurity
28-May-2018
University for Cybersecurity
28-May-2018
OpSec, Soft Skills, And People
28-May-2018
OpSec, Soft Skills, And People
28-May-2018
University for Cybersecurity
26-May-2018
Data Management & GDPR
26-May-2018
Data Management & GDPR
25-May-2018
🇪🇺 GDPR Day!
25-May-2018
🇪🇺 GDPR Day!
23-May-2018
Encryption Law Enforcement And Transparency
23-May-2018
Encryption Law Enforcement And Transparency
22-May-2018
3, 2, 1, GDPR
22-May-2018
3, 2, 1, GDPR
18-May-2018
Being Transparent With User Data
18-May-2018
Listening To Customers
18-May-2018
Being Transparent With User Data
18-May-2018
Listening To Customers
15-May-2018
Ethics In Technology & Security
11-May-2018
Making A Break To Start Your Cybersecurity Career
10-May-2018
What You Need To Get Started In Cybersecurity
09-May-2018
A.I. Amok
08-May-2018
A.I.'s Security & Privacy Impact
08-May-2018
The Ultimate Guide to AWS re:Invent 2018
07-May-2018
Getting Started In Cybersecurity In A Positive Direction
04-May-2018
F**king Passwords
03-May-2018
The F8 Fallout
03-May-2018
Password Health
01-May-2018
F8 & The Future Of Facebook
27-Apr-2018
The Hallway Track
25-Apr-2018
Your Role as a Security Educator
25-Apr-2018
Poor Naming Choice For Gmail Redesign
25-Apr-2018
The Cybersecurity Paradox in Operational Technologies
24-Apr-2018
Live Streaming and Needless Complexity
23-Apr-2018
The Canadian Criminal Code on Hacking
20-Apr-2018
The Security Team's Role In Your Org
18-Apr-2018
Blocking IP Addresses
16-Apr-2018
Fear Uncertainty And Doubt
13-Apr-2018
iOS Graykey And Going Dark
13-Apr-2018
Apple vs. The FBI
12-Apr-2018
Splitting Hairs With Facebook Testimony
11-Apr-2018
Privacy And Security vs. Usability
06-Apr-2018
Video Streaming Options
05-Apr-2018
AWS San Francisco Summit 2018 Recap
29-Mar-2018
Ubiquitous Digital Tracking
28-Mar-2018
Changing Perspectives & The Unraveling Of Online Tracking
28-Mar-2018
Facebook Data Mining & The Long Weekend Round-up
27-Mar-2018
Working With Data
26-Mar-2018
Facebook Data Downloads
23-Mar-2018
One Billion Attacks Per Day
22-Mar-2018
Privacy At Scale
20-Mar-2018
Organizational Design and OT Risk
19-Mar-2018
Facebook Data Misuse And Social Network Responsibility
16-Mar-2018
CPUs, ICOs, and Blockchains
15-Mar-2018
Nervous For SXSW
15-Mar-2018
Rizenfall And Needless Hype
13-Mar-2018
SXSW Audience Level
11-Mar-2018
Rogue Robots
02-Mar-2018
DDoS Attacks & Community Responsibility
01-Mar-2018
Secure Systems Thinking
28-Feb-2018
New Website
27-Feb-2018
Apple iOS 11 Security
26-Feb-2018
Cybersecurity In & Of Canada
23-Feb-2018
Passwords, Educating Users, and the Communal Good
23-Feb-2018
Python Extension Modules in AWS Lambda
22-Feb-2018
Workflow, Passwords, and More
21-Feb-2018
DevOps Overload
20-Feb-2018
Voice Interfaces
16-Feb-2018
Apple iOS Messenger App Crash
15-Feb-2018
Blockchain For Identities
14-Feb-2018
Risk Assessments & The Risk Of No Data
13-Feb-2018
Pyeongchang 2018 Olympic Games Hack
12-Feb-2018
Perspectives
03-Oct-2017
The Ultimate Guide to Your First AWS re:Invent
08-Nov-2016
5 Ways To Get The Most Out Of AWS re:Invent 2016
22-Sep-2015
5 Ways To Get The Most Out Of AWS re:Invent 2015
15-Apr-2015
What is Steganography?
20-Dec-2014
Exploring AWS Lambda
12-Nov-2014
Shared Responsibility Examples: Shellshock
05-Nov-2014
Shared Responsibility Examples: POODLE
29-Oct-2014
Shared Responsibility Examples: The Re:Boot
22-Oct-2014
Cloud Security: Shared Responsibility in Action
10-Oct-2014
Another Day, Another Data Breach
20-Jun-2014
The Code Spaces Nightmare
06-Jun-2014
A Pragmatic Approach to Scaling Security in the Cloud
02-Jun-2014
Continuous Monitoring for Situational Awareness
24-Apr-2014
Security on Azure
22-Apr-2014
Getting Up to Speed on Azure
14-Apr-2014
Heartbleed – One Week In
31-Mar-2014
AWS Summit San Francisco 2014
26-Mar-2014
Security Operations: The Big Picture
20-Mar-2014
Updating Forensics for the Cloud
18-Mar-2014
Updating Network Security Monitoring for the Cloud
13-Mar-2014
Updating Incident Response for the Cloud
11-Mar-2014
Updating Security Operations for the Cloud
12-Feb-2014
Changes in the Cloud Discussion
01-Mar-2011
Whaling