Jun 2, 20153 minTop Technical Mitigation Strategies (from the Australian DSD)There are few solid pieces of empirical evidence on what works in security. The Australian Defense Signals Directorate (DSD) Strategies...
Feb 16, 20153 minHow to Write a Great ResumeLately we’ve working with people to help them improve how to present themselves. Some of the people we know well as great security...
Dec 23, 20142 minSchadenfreude and Shame in SecurityHype, opportunists, and bad ideas are getting the spotlight after the massive breach of Sony Pictures. Most of us observers are sitting...
Jul 31, 20141 minCan you be too secure?When I hear someone say “you can never be too secure,” I assume they don’t understand the implications of that statement. Perfect...
Jul 14, 20131 minOWASP Mobile Security Project: Top 10 Risks PresentationOver the weekend, Beau Woods presented to OWASP Korea on the OWASP Mobile Security Project. The presentation focused on the OWASP Top 10...
Mar 28, 20131 minEnhance Innovation and Improve Security like Zappo’sZappo’s is known for having a culture that spawns innovation. They do this in unconventional ways for an online retailer, such as asking...
Mar 20, 20136 minSouth Korean Media and Banks under CyberattackUpdate March 22, 2013 18:00 (UTC+9): New information from the Korean Communications Commission (KCC) said that the earlier report...
Mar 19, 20132 minIncident Response to Data Breaches and Schrodinger’s CatAre sloppy security controls actually beneficial to a company during a breach? This is an elephant in the room for Incident Response...