PinnedDo we need to move to the darknet to protect out privacy? Here’s how it can be done.The darknet isn’t just for crime. Here are lawful ways you can use the Dark Web to greatly improve your privacy…Aug 12, 20241Aug 12, 20241
How to train your enterprise’s cyber defense team on the NIST Cybersecurity Framework 2.0The NIST Cybersecurity Framework (CSF) provides solid guidance for various facets of cyber defense.Feb 4Feb 4
Consumer IoT and privacyHere’s a classic piece that I wrote in 2017 that’s still relevant in 2025.Jan 8Jan 8
How to configure a firewallFirewalls are one of the most important network security devices you can possibly have. Everyone who uses the internet or internal networks…Nov 7, 2024Nov 7, 2024
A fun introduction to fileless malwareLet’s talk about fileless malware! This is a fun topic! The topic is so much fun because it forces antivirus vendors to develop and improve…Nov 5, 2024Nov 5, 2024
Identifying anonymous programmers by their codeIt would be tremendously beneficial for people who work in malware forensics to have better methodolgies for determining human authors!Nov 1, 2024Nov 1, 2024
8 ways you’re doing PKI wrongYour certificates and encryption are only as good as your public key infrastructure (PKI). Here are my essential tips for enterprises!Oct 29, 2024Oct 29, 2024
All about insider cyber threats!Perhaps it’s insider threats that enterprises aren’t threat modelling properly. Here are my tips so you aren’t attacked from the inside!Oct 22, 2024Oct 22, 2024
Bluetooth exploits: BlueSmacking, BlueJacking, BlueSnarfing… oh my!There are lots of fascinating ways that cyber attackers can ruin your day through the Bluetooth interfaces on your devices!Oct 16, 20241Oct 16, 20241
What we know about the Internet Archive cyber attackThe Internet Archive is one of the most important technological projects ever. True hackers wouldn’t want to destroy it.Oct 10, 20241Oct 10, 20241