I woke up at 5:30am this morning with an idea. Many studies have shown that appreciation…
Archives for March 2016
I Know What I Want to Be
I think I might have figured out, just in the last few weeks, what I want to do…
Analysis of Verizon’s 2016 Data Breach Digest
I’m staring to make it a habit to do a quick read and summary of data breach…
How to Use the Dot Before @ Reply on Twitter
Mar 11, 2019 — This no longer works like this. Many people are confused…
T1SP: Episode 32
[ Subscribe to the Podcast: iTunes | Android ] News [ ] Verizon Enterprise Solutions…
Exchanging Services in the Future
Instead of catching the bus, Crowley decides to get some exercise on this beautiful…
Why I Still Like my Apple Watch
A lot of people seem to be unsatisfied with their Apple Watches. I think I know…
Securing Your Public Source Code Repositories
Public source code repositories, such as those available on Github and similar…
Good Parenting and Focus on Self Are Mutually Exclusive
Perhaps one of the problems in the western world is that there is an inherent…
AI Assistants Are The New Applications
There’s an entire ecosystem, akin to the App Store in its scale, to be built.…
Innovative Security Products (2016 Edition)
One of the highest value events at RSA every year is the Innovation Sandbox, where…
Idea Expansion Format (IEF)
I think it’s far too difficult to extract the key ideas from most content.…
T1SP: Episode 31
[ Subscribe to the Podcast: iTunes | Android ] News [ ] FBI saying it will force…
Human Attention as Influence Attack Surface
We are living in a world in which a handful of high-tech companies, sometimes…
On Helping Friends With Their Careers
I’ve always been known as the guy that helps his friends. I’d never…
How to Manage Expectations in Internal Security Leadership Roles
I’ve seen numerous friends and acquaintances take and serve in upper-level…
We Need a Socialist Correction, Not Socialism
There’s a reason I’m not afraid of Bernie Sanders’ socialism,…
RSA 2016 Analysis
Every year at RSA I try to spend time on the floor looking at the vendors. I do…
The DROWN SSL Attack
DROWN allows attackers to break the encryption and read or steal sensitive communications,…