Tarah WheelerAn education-based approach to curbing CSAM productionOriginally published in Brookings TechStream.7 min read·Mar 30, 2022----
Tarah Wheeler4 Truths About Cybercrime (and the research to back them up)I was recently asked by someone involved in policymaking for a short bulleted reading list on cybercrime and how to understand the major…4 min read·Jan 12, 2022----
Tarah WheelerYes, there was a hidden epic cryptographic puzzle story inside my book, “Women In Tech.”And the champions just received their solid silver medals for solving the series.6 min read·Jul 11, 2020----
Tarah WheelerHow much should startups spend on information securityWhen you have little to no budget, how do you start spending on information security in a startup to protect customer data and operations…4 min read·Mar 14, 2020----
Tarah WheelerPKI — public key infrastructure, explained(originally posted https://tisiphone.net/2018/03/07/the-infosec-amnesty-qa/ with thanks to Lesley “Hacks4Pancakes” Carhart)9 min read·Mar 15, 2018--1--1
Tarah WheelerHow to use Twitter’s new non-SMS based 2FA with apps such as Authy or Google AuthenticatorJust a few minutes ago, Twitter enabled the option to protect accounts with 2FA (Two-Factor Authentication) without the user having to rely…3 min read·Dec 20, 2017--5--5
Tarah WheelerLet’s all calm down now: the WikiLeaks CIA infodump isn’t bigger than SnowdenTarah Wheeler, hacker, & Sandy Clark, Ph.D., University of Pennsylvania Computer and Information Science6 min read·Mar 7, 2017--2--2