Decisions are hard enough that you don't want to have to revisit them constantly. But that's exactly what is required in the realm of cybersecurity. Do you have a system in place to review decisions? Are you recording the right information to update those decisions when the time come
User experience is often overlooked when it comes to security and privacy. This leads to some confusing, dangerous, and challenging situations that users are forced into. Why?!?
During a large incident response, bringing everyone together to a "war room" can be the difference in a speedy recovery, but there are downsides as well. The biggest? Fatigue & burnout. How do you monitor and handle that?
There is a ton of news and information on social networks. There's also a mountain of garbage. How do you sort through it all? Can you? Do we have the tools we need to make sense of the content we're presented with?
Many questions come along with the federal legalization of cannabis in Canada. It's a massive example of trickle down risk as various controls around usage and methods of delivery are pushed into areas they weren't designed for. Are you doing the same thing with your IT deployments? Are
Virtual events can be a great way to connect with your audience. They are not only less expensive to run but they are much easier to access for most people. So why are they rarely enjoyable despite having great content?
When you're trying to teach, pass along a message, or just generally reach anyone, the key is to understand how THEY want to consume information. That's a huge gap in most communications today, especially breach notification. Put yourself in the audience's shoes!
Facebook removes 800+ accounts this week, some with massive followings, for political content. The twist? They were US-based, not foreign. What does this mean for our use of social networks?
Google recently conducted a complete security & privacy review of various APIs associated with Google+. The result? The service is shutting down and they found a vulnerability. Did they take the proper steps in disclosing the issue?
With the Bloomberg report on hardware hacking looking more in doubt, more and more politics are coming into play. Anytime you evaluate news, it's important to look at things objectively. Here are a few tips around evaluating cybersecurity news.
Bloomberg has an absolutely earth shattering report citing a hardware supply chain attack that—they say—impacted several big names. Here's why this type of attack is so difficult to defend against but also near impossible to execute.
Reflecting back on my keynote at SecTor in Toronto where I delivered some tough new to a roomful of security professionals. Here's what worked and what could've been better!