Time for an Internet Reset?

The Internet has grown just a bit since former VP Al Gore created it way back in 1983. In that time, chances are that we’ve all left one or two virtual breadcrumbs online. While the right to…

Read More »

Want to Fail at Security? COMPLY!

No Picture

Take a deep, cleansing breath, and say it with me: “Compliance is not security.” Good. One more time. “Compliance is not security.” It’s okay. We’re all friends here. No need for false pretenses. We all know how…

Read More »

The Curse of the Information Security Professional

No Picture

Time magazine recently published an article summarizing CareerCast’s research on the most/least stressful jobs. At the top of the Most Stressful list: Enlisted Military Personnel. That makes PERFECT sense. High physical and travel demands, ridiculously low salary,…

Read More »

22 Sites Where You Should Enable Two Factor Authentication RIGHT NOW

No Picture

The reason we have passwords is to make it harder for attackers to get to our stuff. Ideally, strong passwords ensure that we’re the only ones who can access our email inboxes, our social media profiles, our…

Read More »

The 85,100 Passwords Forbidden by @Dropbox

No Picture

It’s amazing what you can learn about a mobile app using a zip utility and a text editor. As someone who has spent years working in the mobile app security space, my two favorite Windows tools are…

Read More »

How to Kickstart a Career in Application Security

No Picture

A friend and fellow geek recently reached out for some career advice. He’s currently working as an app developer, and he was wondering what steps he could take to steer his career more toward application security. Since…

Read More »

Think Your @Facebook Photos Are Private? Think Again.

No Picture

First, a little context: I’m a dad, which means I am more familiar with the Elf on the Shelf than I ever dreamed I might be. For the uninitiated, this cute little creature comes to life each…

Read More »

Surviving an Active Shooter Event

No Picture

It’s a damn shame we live in a world where videos like this are necessary. That said, I’m grateful that Ready Houston took the time to put this video together. The video is only 6 minutes long….

Read More »

Step-by-Step Guide To Decompiling Android Apps

No Picture

It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles. – Sun Tzu With the pressure for every company to have an app (or two, or…

Read More »

Bridging the Social Media Implementation/Audit Gap

No Picture

It’s one thing to embrace social media, but it’s another thing entirely to embrace it securely. This presentation helps organizations understand what steps should be taken to ensure that their social media properties are abused or exploited…

Read More »