I am lucky. No one in my immediate family died in military service to our country. Other families are not so lucky.
Phishing Awareness Metrics
Phishing simulations are cheap and effective training tools, and the metrics they provide over time can provide clear insights into security awareness throughout an organization.
Satellites and Their Vulnerabilities
As satellites become more involved in Earthly communications, they will be targeted by hackers. But how safe are they now?
The California Consumer Privacy Act (CCPA) – Part 3
The CCPA does have some similarities to GDPR, but there are quite a few differences. Final post of a 3-part series.
The California Consumer Privacy Act (CCPA) – Part 2
The CCPA give California residents a lot of rights regarding their digital privacy. Part 2 of a 3-part series.
The California Consumer Privacy Act (CCPA) – Part 1
The California Consumer Privacy Act (CCPA) is one of the strongest digital privacy laws in the US. Part 1 of a 3-part series.
Sort Your Lists – Penetration Test Reporting Tips
There are testers who think I’m nutz for insisting that they sort any lists they include in their reports. Let me tell you my side of the story…
OWASP & The Top 10
The OWASP Top 10 details critical risks associated with web application security and is the defacto standard for web app security.