Posts tagged with Mornings With Mark

Live streamed to 1,250+ viewers each morning, each episode of this show took a deeper look into a security or privacy topic that's in the news or just on Mark's mind. Ran for almost 200 episodes in 2018 and 2019.

What Do You Look To Get Out Of Conferences?

Conferences are usually jam packed with great content. So much so that it can be hard to prepare for them and get the most out of them. What do you look for in a conference? How can I help?

Read more...

Security Is A Quality Issue

Security is a quality issue. Except we don't treat it that way and that's costing us dearly.

Read more...

The Basic Basics

With the initial set of cybersecurity basics segments done, I'm think it's worth moving to a "basics" basics series. The goal would be to help everyone understand how the internet works, how email is structure, etc. Thoughts?

Read more...

Cybersecurity Basics #12 - Bolt-on vs Built-in

Built-in security is always best. That's "security by design", but when that fails (due to mistakes, oversight, humans), built-in security steps up...or, um, in.

Read more...

Cybersecurity Basics #11a - Risk Assessments Redux

In your personal life you're assessing risk constantly whether you know it or not. In the digital world the same thing happens BUT you probably don't have the required context to make an informed decision.

Read more...

Cybersecurity Basics #11 - Risk Assessments & Pen Tests

Risk assessments are useful when kept in context and continually updated. A penetration test (or pen test) is when your system undergoes a "friendly" attack with the idea of find issues before cybercriminals do. Together they are a strong set of practices to help you defences.

Read more...

Cybersecurity Basics #10 - Personally Identifiable Information

Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.

Read more...

Cybersecurity Basics #9 - Attack Attribution

Who did it? It's a powerful question and the answer to "What is attack attribution?"

Read more...