Lara MosslerA quick and dirty user research guide for internal platformsIt’s so easy to skip this but don’t 🙈Apr 29Apr 29
Lara MosslerTools for Credential Stuffing: A Deep Dive [Updated: 2024]There are two main changes since I wrote the last version of this article in 2017. There’s been an increase in free credentials available…Mar 29Mar 29
Lara MosslerThe rise of third party data breaches + ideas to solidify your strategyThird-party data breaches are becoming common for businesses in today’s digital world. Let’s break it down.Feb 16Feb 16
Lara MosslerinDigital Security NowTools for Credential Stuffing: A Deep DiveCredential stuffing has become a commonplace tactic where a hacker will steal someone’s username or password and use them to log into other…Oct 13, 2017Oct 13, 2017
Lara MosslerinDigital Security NowThe 5 Biggest Security Breaches of 2017 (So Far)2017 isn’t over yet and there have already been several large-scale security breaches. In fact, more security breaches in 2017 have leaked…Sep 29, 2017Sep 29, 2017
Lara MosslerinDigital Security NowThe Full-Scale Assault of Credential StuffingHarder, better, faster, strongerSep 21, 2017Sep 21, 2017
Lara MosslerinDigital Security NowSomeone Needs to Tell TCPA That it’s 2017When Laws exist before the technology they governSep 14, 20171Sep 14, 20171
Lara MosslerinInnovations in GAINProven tacticsDefining what works in Government InnovationMay 20, 2014May 20, 2014
Lara MosslerinInnovations in GAINHow can campaigns make new laws simple to understand?new policy, new opportunityMay 2, 2014May 2, 2014
Lara MosslerinInnovations in GAINWhy data visualization needs to articulate performancesimple concept, new stakesMay 2, 2014May 2, 2014