An education-based approach to curbing CSAM productionOriginally published in Brookings TechStream.Mar 30, 2022Mar 30, 2022
4 Truths About Cybercrime (and the research to back them up)I was recently asked by someone involved in policymaking for a short bulleted reading list on cybercrime and how to understand the major…Jan 12, 2022Jan 12, 2022
Yes, there was a hidden epic cryptographic puzzle story inside my book, “Women In Tech.”And the champions just received their solid silver medals for solving the series.Jul 11, 2020Jul 11, 2020
How much should startups spend on information securityWhen you have little to no budget, how do you start spending on information security in a startup to protect customer data and operations…Mar 14, 2020Mar 14, 2020
PKI — public key infrastructure, explained(originally posted https://tisiphone.net/2018/03/07/the-infosec-amnesty-qa/ with thanks to Lesley “Hacks4Pancakes” Carhart)Mar 15, 20181Mar 15, 20181
How to use Twitter’s new non-SMS based 2FA with apps such as Authy or Google AuthenticatorJust a few minutes ago, Twitter enabled the option to protect accounts with 2FA (Two-Factor Authentication) without the user having to rely…Dec 20, 20175Dec 20, 20175
Let’s all calm down now: the WikiLeaks CIA infodump isn’t bigger than SnowdenTarah Wheeler, hacker, & Sandy Clark, Ph.D., University of Pennsylvania Computer and Information ScienceMar 7, 20172Mar 7, 20172