How to Kickstart a Career in Application Security

A friend and fellow geek recently reached out for some career advice. He’s currently working as an app developer, and he was wondering what steps he could take to steer his career more toward application security. Since I’m a geek with a degree in music education who now works as an information security consultant who […]

Think Your @Facebook Photos Are Private? Think Again.

First, a little context: I’m a dad, which means I am more familiar with the Elf on the Shelf than I ever dreamed I might be. For the uninitiated, this cute little creature comes to life each night while the kids are fast asleep, usually to get into some sort of mischief before the kids […]

Surviving an Active Shooter Event

It’s a damn shame we live in a world where videos like this are necessary. That said, I’m grateful that Ready Houston took the time to put this video together. The video is only 6 minutes long. I rarely share physical security posts, but I highly recommend that you give this video a watch. If […]

Step-by-Step Guide To Decompiling Android Apps

It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles. – Sun Tzu With the pressure for every company to have an app (or two, or three) in both iTunes and Google Play, the pressure is on both security teams and development teams to […]

Bridging the Social Media Implementation/Audit Gap

It’s one thing to embrace social media, but it’s another thing entirely to embrace it securely. This presentation helps organizations understand what steps should be taken to ensure that their social media properties are abused or exploited to attack the organization. The title may be boring, but the information is useful. Bridging the Social Media […]