Security Cloud Courses About

Tagged With 'Rant'

<< More tags

imgs/thumbnail.webp
Security and Privacy Are Linked

Security and privacy are linked yet for some reason, you see privacy experts ignoring the impact of security and security experts who are unconcerned …

imgs/thumbnail.webp
How AI Could Help Ease Your Zoom Fatigue

Is your day chalk full of video calls? Wondering why you’re exhausted at the end of the day? The two might be related 😉. In this column, Robyn …

imgs/thumbnail.webp
The Goal of Cybersecurity

To make sure that systems work as intended and only as intended. That’s the goal of cybersecurity.

imgs/thumbnail.webp
Dumpster Fire

🗑🔥 doesn’t quite cut it anymore. Following a random thought, I dive into the process to create a new official emoji and why isn’t …

imgs/thumbnail.webp
#BlackLivesMatter

#BlackLivesMatter has risen to prominence again in the past weeks as protests spread beyond the USA to the world. A positive shift is happening as …

imgs/thumbnail.webp
NULL & Input Validation

NULL is one of many special characters that has a long history in computing. What are the consequences of using NULL as a value provided via user …

imgs/thumbnail.webp
10x Engineers

Recently on Twitter a nerd fight started around the idea of a 10x engineer. VC Shekhar Kirani kicked things off by advocating that startups do …

imgs/thumbnail.webp
Update On Mornings With Mark

A quick update on why MwM has been missing the past couple of weeks and where this show is going in the future.

imgs/thumbnail.webp
Cybersecurity Motivations

Recently a video of mine was flagged by YouTube’s automated ContentID system which may or may not have been justified. Regardless, it got me …

imgs/thumbnail.webp
Perfectionism In Tech

It’s tempting to search for the perfect solution to a problem. The challenge? That “perfection” rarely exists. But time after time, …

imgs/thumbnail.webp
Cybersecurity Needs Coders

An interesting op-ed from Dr. Egginton at John Hopkins University highlights some efforts underway in the US to declare learning to code the …

imgs/thumbnail.webp
The Cybersecurity Industry

I you were just starting to try and understand the cybersecurity problem space, a CEO or CIO working to better grasp the challenges facing your …

imgs/thumbnail.webp
Konmari Your Data

Data is extremely valuable. We’ve seen that with data brokers, social media giants, and almost every company out there. The current attitude is …

imgs/thumbnail.webp
Setting Up 2019

2019 is in full effect and I’m stumbling?!?

Planning for a new year is exciting but can also be challenging. When I sat down to plan out 2019 …

imgs/thumbnail.webp
Squad Goals

150th episode! As I wind down for the year, I always try to look back at what has worked and what hasn’t. This show has evolved from a simple …

imgs/thumbnail.webp
On The Importance Of Names

Names matter. They help a community come together around a singular concepts. But what happens when definitions and usage differ?

imgs/thumbnail.webp
Unexpected Lessons

Sometimes things don’t go as expected. That can be frustrating and unfortunate…but also an opportunity to learn.

imgs/thumbnail.webp
Fortnite, A Service Delivery Example

Fortnite is an international sensation. Despite being truly free-to-play, they are making a lot of money by continually improving the game experience, …

imgs/thumbnail.webp
Delivering Information With Context

After a jam packed AWS re:Invent 2018, I’ve been thinking about how to deliver information to an audience. One of the challenges is delivering …

imgs/thumbnail.webp
Communication At Scale

When you are trying to get a message out to a lot of people, it’s not realistic to try and get them all back to you digital properties. So what …

imgs/thumbnail.webp
Preparation Is Key

The “secret” to most success is being prepared. Taking a few minutes or hours to map out what you want to happen is far better than trying …

imgs/thumbnail.webp
Signals And The Data Explosion

Before any big shifts there are always small signals that hint at what’s coming. We’re seeing more and more companies start to make a play …

imgs/thumbnail.webp
You Can't Blame 'Em

We build services and solutions using parts provided by other companies. That’s the only way to move forward effectively. When a security or …

imgs/thumbnail.webp
Optimize Your Tools

You know you have to master your tools but are you selecting or building the right tools? A lot of teams over or under engineer their tools. This …

imgs/thumbnail.webp
Politics & Attack Attribution

Cyberattack attribution is HARD. But time and time again, we’re seeing attributions—who carried out the attack—made publicly with little to no …

imgs/thumbnail.webp
Master Your Tools

Knowing what the tools in your kit are capable of is critical to success. But can you actually use those features? Do you really understand the …

imgs/thumbnail.webp
Know Your Audience

Your product/solution/service has a goal and you’ve probably gotten good at articulating that goal…but is that message resonating with …

imgs/thumbnail.webp
Automating Your Job

“Don’t do work you don’t have to.” It’s a solid rule and one that you can leverage more often than you think. There are …

imgs/thumbnail.webp
Refreshing Your Perspective

Working deeply on any one problem for too long narrows your perspective. That’s just human nature. Are you taking steps to refresh that …

imgs/thumbnail.webp
Building On Fragile Layers

Nothing is built in isolation. Each technology builds on layers and layers of technology before it. But are those layers worth building on? Can they …

imgs/thumbnail.webp
Keep Decisions Up To Date

Decisions are hard enough that you don’t want to have to revisit them constantly. But that’s exactly what is required in the realm of …

imgs/thumbnail.webp
User Experience Is Critical

User experience is often overlooked when it comes to security and privacy. This leads to some confusing, dangerous, and challenging situations that …

imgs/thumbnail.webp
DRUGS!!! and IT Risk and Graphs

Many questions come along with the federal legalization of cannabis in Canada. It’s a massive example of trickle down risk as various controls …

imgs/thumbnail.webp
Virtual Experiences & Content Delivery

Virtual events can be a great way to connect with your audience. They are not only less expensive to run but they are much easier to access for most …

imgs/thumbnail.webp
Communicating FOR Your Audience

When you’re trying to teach, pass along a message, or just generally reach anyone, the key is to understand how THEY want to consume …

imgs/thumbnail.webp
Evidence, Accusations, and Motivation

With the Bloomberg report on hardware hacking looking more in doubt, more and more politics are coming into play. Anytime you evaluate news, …

imgs/thumbnail.webp
Following Up On Tough News

Reflecting back on my keynote at SecTor in Toronto where I delivered some tough new to a roomful of security professionals. Here’s what worked …

imgs/thumbnail.webp
How To Deliver Tough News

Sometimes you have to deliver really bad news. It’s not your fault, but you’re the one on the hook. How do you deliver it? How do you …

imgs/thumbnail.webp
What Do You Look To Get Out Of Conferences?

Conferences are usually jam packed with great content. So much so that it can be hard to prepare for them and get the most out of them. What do you …

imgs/thumbnail.webp
Security Is A Quality Issue

Security is a quality issue. Except we don’t treat it that way and that’s costing us dearly.

imgs/thumbnail.webp
Cybersecurity Basics #12 - Bolt-on vs Built-in

Built-in security is always best. That’s “security by design” but when that fails (due to mistakes, oversight, humans), built-in …

imgs/thumbnail.webp
Cybersecurity Basics #9 - Attack Attribution

Who did it? It’s a powerful question and the answer to “What is attack attribution?”

imgs/thumbnail.webp
Cybersecurity Basics #4 - Perspective

Perspective is a tricky thing….maybe the hardest aspect of cybersecurity

imgs/thumbnail.webp
Recharged, Reset, & Rocking

Back from vacation, I recap the show’s structure and new channels as well as the plan around “the basics”

imgs/thumbnail.webp
Easy To Use Tools

We’re creating more and more data but despite advancements in data processing, we’re still lacking easy to use tools to understand …

imgs/thumbnail.webp
Toxicity & Security's Responsibility

Security is there to ensure that the systems you build work only as intended. Part of that is realizing the potential for abuse and ensuring that the …

imgs/thumbnail.webp
Discussions At Scale

A lot of the issues facing our communities and sub communities today (deep fakes, encryption, privacy, DevOps, etc.) need active discussions. By their …

imgs/thumbnail.webp
HR Challenges & Getting Your First Security Role

Getting your first cybersecurity role can be difficult. Is part of the problem how organizations are hiring talent?

imgs/thumbnail.webp
Constant Negative Pressure

You cannot stand at “Red Alert” 24/7 but that’s exactly what we do in cybersecurity…often without realizing it. What impact …

imgs/thumbnail.webp
Assumptions & Outdated Mental Models

Unchecked assumptions are a major risk in any field…but in cybersecurity they take on a whole new level

imgs/thumbnail.webp
Remote Work, Cubes, & Everything In Between

Where–physically–do you work? Does it matter?

imgs/thumbnail.webp
Balance & Burnout

It’s all too easy to burnout in IT in general…more so in security. Why? What’s the cost?

imgs/thumbnail.webp
Fortnite, UI Patterns, and Desired Behaviours

Design has a massive impact on user behaviour. Sadly, it’s often ignored when it comes to security and privacy.

imgs/thumbnail.webp
Security Thinking Is Service Design Thinking

We’ve spoken a lot of maintaining and expanding perspective when it comes to cybersecurity. In this episode, we dive in highlight a methodology …

imgs/thumbnail.webp
Ethics And Action In Technology

Ethical questions and quandaries are tough enough to work though when they are theoretical. But when you’re confronted with them in the real …

imgs/thumbnail.webp
Ethics In Technology And Cybersecurity

How new technologies are used and built is really up to us. Regardless of your moral compass, it’s important that you discuss the creation & …

imgs/thumbnail.webp
Net Neutrality

Net Neutrality is a simple dictate that states all network packets must be treated equally. This–of course–tanks a few business models for …

imgs/thumbnail.webp
What's In A Name?

We know that cybersecurity isn’t the best name to describe what is ostensibly, “information security” but it’s the name …

imgs/thumbnail.webp
Why Can't Security Place Nice With Others?

Is it just attitude that keeps security teams from working well with the rest of the organization? And if so, can that attitude be changed? …

imgs/thumbnail.webp
Information Security vs. Cybersecurity

At some point in the past few years, the term “information security” took a back seat to “cybersecurity”. Does it matter? Why?

imgs/thumbnail.webp
Ethics In Technology & Security

Deep thoughts in this episode around ethics in technology and their use. Sparked by the latest issues around mobile phone tracking, this episode …

imgs/thumbnail.webp
The Hallway Track

When you’re at a conference, one of the biggest perks is the “hallway track”. The serendipitous run-ins with people you follow …

imgs/thumbnail.webp
Fear Uncertainty And Doubt

Cybersecurity is often positioned from the negative. There are bad things coming to get you! What a waste of energy…

imgs/thumbnail.webp
Apple vs. The FBI

The FBI and other federal law enforcement in the US (and elsewhere) continue to push back against “going dark”. Thankfully Apple is …

imgs/thumbnail.webp
Privacy And Security vs. Usability

It’s often stated that you have to trade usability for security. I call 💩

imgs/thumbnail.webp
CPUs, ICOs, and Blockchains

Lots of hype around CPU flaws, ICOs failing, and blockchain. This episode looks to cut through some of it!

imgs/thumbnail.webp
Nervous For SXSW

My impressions of my first SXSW and the challenges of getting back on stage after a bit of a break

imgs/thumbnail.webp
SXSW Audience Level

Cybersecurity and privacy are a core part of the fabric of all technology. So why are they missing at most non-security conferences?

imgs/thumbnail.webp
New Website

In this episode we do a quick recap of the Canadian federal budget announcements around cybersecurity, talk about SXW, and the upcoming launch of the …

imgs/thumbnail.webp
Perspectives

There is always new threat to worry about in cybersecurity. Keeping perspective about the likelihood of that threat being an actual issue is critical.

imgs/thumbnail.webp
Restart

Keeping a personal website up to date is always tricky. The technical pieces are simple, it’s be satisfied with the design and making the …