Are NFTs, Web3, and Blockchains useful? Or just hype?
Two minutes of work can stop hackers in cold in their tracks.
Bug bounties help bridge the gap between security researchers and companies.
The risks of smart contract bugs are quickly becoming apparently. They can cost millions.
Misconfigurations in Amazon S3 keep happening. Here’s why and how to stop them.
The NFT/Web3 world certain is the wild west…and some projects are way, way more wild.
If you can’t read the code in a Web3 contract, do you really know what it’s going to do?
If a smart contract works as coded and the code is wrong, is the contract valid?
Anytime there’s a security issue, someone gets labelled a hacker. Is that the right term?
Here are the steps I use to break down technology topics for a wider audience.
“Um” is not a great call to action, but sometimes it’s all you’ve got.
Can you—as a user—understand an app or service’s security posture? If so, how?
What steps should we take to evaluate the privacy impact of a mobile app?
Data Privacy Day is January 28th, can we raise awareness about the issues around data privacy effectively? Will you take action?
Should be able to encrypt your communications? The debate is on…again
A lot of risk decisions are made in the dark…why?
NFTs are digital assets. That means there are cybersecurity concerns with them too.
NFTs are all the rage right now. Make sure you understand what they are before diving in.
The hype around these terms is muddying the waters. What exactly are NFTs, blockchains, and Web3?
There are a ton of frameworks out there for building solutions but I think conceptually, it really boils down to goals and feedback loops
It’s exciting building solutions with the latest frameworks and technology. Is that the best route to meet our goals? What ARE our goals?
When we talk about privacy, what are we really talking about? The formal definition of privacy is definitely outdated. What would a good definition be?
If the goal of cybersecurity is to make sure that the system you are building works as intended and only as intended, what about stopping hackers?
Security and privacy are inextricably linked. Why aren’t they at the core of all technology?