Just because you can solve a problem, doesn’t mean you should.
Good enough sometimes is.
Digital privacy is critical in our communities. Why don’t we have it?
Here are the steps I use to break down technology topics for a wider audience.
Should be able to encrypt your communications? The debate is on…again
A lot of risk decisions are made in the dark…why?
How do we respond to risk? Do we have the data we need to make an informed decision?
NFTs are digital assets. That means there are cybersecurity concerns with them too.
NFTs are all the rage right now. Make sure you understand what they are before diving in.
The hype around these terms is muddying the waters. What exactly are NFTs, blockchains, and Web3?
There are a ton of frameworks out there for building solutions but I think conceptually, it really boils down to goals and feedback loops
It’s exciting building solutions with the latest frameworks and technology. Is that the best route to meet our goals? What ARE our goals?
When we talk about privacy, what are we really talking about? The formal definition of privacy is definitely outdated. What would a good definition …
If the goal of cybersecurity is to make sure that the system you are building works as intended and only as intended, what about stopping hackers?
Security and privacy are inextricably linked. Why aren’t they at the core of all technology?
Security and privacy are linked yet for some reason, you see privacy experts ignoring the impact of security and security experts who are unconcerned …
Is your day chalk full of video calls? Wondering why you’re exhausted at the end of the day? The two might be related 😉. In this column, Robyn …
To make sure that systems work as intended and only as intended. That’s the goal of cybersecurity.
🗑🔥 doesn’t quite cut it anymore. Following a random thought, I dive into the process to create a new official emoji and why isn’t …
#BlackLivesMatter has risen to prominence again in the past weeks as protests spread beyond the USA to the world. A positive shift is happening as …
NULL is one of many special characters that has a long history in computing. What are the consequences of using NULL as a value provided via user …
Recently on Twitter a nerd fight started around the idea of a 10x engineer. VC Shekhar Kirani kicked things off by advocating that startups do …
A quick update on why MwM has been missing the past couple of weeks and where this show is going in the future.
Recently a video of mine was flagged by YouTube’s automated ContentID system which may or may not have been justified. Regardless, it got me …
It’s tempting to search for the perfect solution to a problem. The challenge? That “perfection” rarely exists. But time after time, …
An interesting op-ed from Dr. Egginton at John Hopkins University highlights some efforts underway in the US to declare learning to code the …
I you were just starting to try and understand the cybersecurity problem space, a CEO or CIO working to better grasp the challenges facing your …
Data is extremely valuable. We’ve seen that with data brokers, social media giants, and almost every company out there. The current attitude is …
2019 is in full effect and I’m stumbling?!?
Planning for a new year is exciting but can also be challenging. When I sat down to plan out 2019 …
150th episode! As I wind down for the year, I always try to look back at what has worked and what hasn’t. This show has evolved from a simple …
Names matter. They help a community come together around a singular concepts. But what happens when definitions and usage differ?
Sometimes things don’t go as expected. That can be frustrating and unfortunate…but also an opportunity to learn.
Fortnite is an international sensation. Despite being truly free-to-play, they are making a lot of money by continually improving the game experience, …
After a jam packed AWS re:Invent 2018, I’ve been thinking about how to deliver information to an audience. One of the challenges is delivering …
When you are trying to get a message out to a lot of people, it’s not realistic to try and get them all back to you digital properties. So what …
The “secret” to most success is being prepared. Taking a few minutes or hours to map out what you want to happen is far better than trying …
Before any big shifts there are always small signals that hint at what’s coming. We’re seeing more and more companies start to make a play …
We build services and solutions using parts provided by other companies. That’s the only way to move forward effectively. When a security or …
You know you have to master your tools but are you selecting or building the right tools? A lot of teams over or under engineer their tools. This …
Cyberattack attribution is HARD. But time and time again, we’re seeing attributions—who carried out the attack—made publicly with little to no …
Knowing what the tools in your kit are capable of is critical to success. But can you actually use those features? Do you really understand the …
Your product/solution/service has a goal and you’ve probably gotten good at articulating that goal…but is that message resonating with …
“Don’t do work you don’t have to.” It’s a solid rule and one that you can leverage more often than you think. There are …
Working deeply on any one problem for too long narrows your perspective. That’s just human nature. Are you taking steps to refresh that …
Nothing is built in isolation. Each technology builds on layers and layers of technology before it. But are those layers worth building on? Can they …
Decisions are hard enough that you don’t want to have to revisit them constantly. But that’s exactly what is required in the realm of …
User experience is often overlooked when it comes to security and privacy. This leads to some confusing, dangerous, and challenging situations that …
Many questions come along with the federal legalization of cannabis in Canada. It’s a massive example of trickle down risk as various controls …
Virtual events can be a great way to connect with your audience. They are not only less expensive to run but they are much easier to access for most …
When you’re trying to teach, pass along a message, or just generally reach anyone, the key is to understand how THEY want to consume …
With the Bloomberg report on hardware hacking looking more in doubt, more and more politics are coming into play. Anytime you evaluate news, …
Reflecting back on my keynote at SecTor in Toronto where I delivered some tough new to a roomful of security professionals. Here’s what worked …
Sometimes you have to deliver really bad news. It’s not your fault, but you’re the one on the hook. How do you deliver it? How do you …
Conferences are usually jam packed with great content. So much so that it can be hard to prepare for them and get the most out of them. What do you …
Security is a quality issue. Except we don’t treat it that way and that’s costing us dearly.
Built-in security is always best. That’s “security by design” but when that fails (due to mistakes, oversight, humans), built-in …
Who did it? It’s a powerful question and the answer to “What is attack attribution?”
Perspective is a tricky thing….maybe the hardest aspect of cybersecurity
Back from vacation, I recap the show’s structure and new channels as well as the plan around “the basics”
We’re creating more and more data but despite advancements in data processing, we’re still lacking easy to use tools to understand …
Security is there to ensure that the systems you build work only as intended. Part of that is realizing the potential for abuse and ensuring that the …
A lot of the issues facing our communities and sub communities today (deep fakes, encryption, privacy, DevOps, etc.) need active discussions. By their …
Getting your first cybersecurity role can be difficult. Is part of the problem how organizations are hiring talent?
You cannot stand at “Red Alert” 24/7 but that’s exactly what we do in cybersecurity…often without realizing it. What impact …
Unchecked assumptions are a major risk in any field…but in cybersecurity they take on a whole new level
Where–physically–do you work? Does it matter?
It’s all too easy to burnout in IT in general…more so in security. Why? What’s the cost?
Design has a massive impact on user behaviour. Sadly, it’s often ignored when it comes to security and privacy.
We’ve spoken a lot of maintaining and expanding perspective when it comes to cybersecurity. In this episode, we dive in highlight a methodology …
Ethical questions and quandaries are tough enough to work though when they are theoretical. But when you’re confronted with them in the real …
How new technologies are used and built is really up to us. Regardless of your moral compass, it’s important that you discuss the creation & …
Net Neutrality is a simple dictate that states all network packets must be treated equally. This–of course–tanks a few business models for …
We know that cybersecurity isn’t the best name to describe what is ostensibly, “information security” but it’s the name …
Is it just attitude that keeps security teams from working well with the rest of the organization? And if so, can that attitude be changed? …
At some point in the past few years, the term “information security” took a back seat to “cybersecurity”. Does it matter? Why?
Deep thoughts in this episode around ethics in technology and their use. Sparked by the latest issues around mobile phone tracking, this episode …
When you’re at a conference, one of the biggest perks is the “hallway track”. The serendipitous run-ins with people you follow …
Cybersecurity is often positioned from the negative. There are bad things coming to get you! What a waste of energy…
The FBI and other federal law enforcement in the US (and elsewhere) continue to push back against “going dark”. Thankfully Apple is …
It’s often stated that you have to trade usability for security. I call 💩
Lots of hype around CPU flaws, ICOs failing, and blockchain. This episode looks to cut through some of it!
My impressions of my first SXSW and the challenges of getting back on stage after a bit of a break
Cybersecurity and privacy are a core part of the fabric of all technology. So why are they missing at most non-security conferences?
In this episode we do a quick recap of the Canadian federal budget announcements around cybersecurity, talk about SXW, and the upcoming launch of the …
There is always new threat to worry about in cybersecurity. Keeping perspective about the likelihood of that threat being an actual issue is critical.
Keeping a personal website up to date is always tricky. The technical pieces are simple, it’s be satisfied with the design and making the …