Cybersecurity Trust, Who Do You? In cybersecurity as in Gotham, who you trust is what it all boils down to. So how should you trust?
Cybersecurity Gen AI Ain't Your Buddy - Neither Is Your Lawnmower This isn't "Her." Your AI isn't Jarvis or Friday. Your AI is like your lawnmower, furnace, or even your car - a tool for getting work done.
Cybersecurity Axioms for Any Cybersecurity Program There are some universal truths that apply to any cybersecurity program, be they for your home environment or the largest enterprises in the world.
Professional Good Vibrations and Coding Vibe Coding sounds like something Spicoli would do whether or not Mr. Hand approves. Frankly it's something we all could do.
Personal I Gave Up My Privacy For Beer Delivery Tracking is a bad thing, except when it is a good thing. How do you make an informed decision about what's good tracking for you without understanding the risks?
Cybersecurity Demystifying Multi-Factor Authentication Multi-Factor Authentication is critical for protecting against the weaknesses of passwords. But not all MFA is created the same, and it can be a confusing thing to do well.
Cybersecurity My Love Letter to Cybersecurity - 2025 I've been in cybersecurity since the early 2000's. It's difficult, frustrating, and thankless. And I still love it 20+ years later.
Personal Privacy Snake Oil: Beware VPN Services Cure alls from yesteryear were routinely cons whose benefits were generally imagined and not real. Unfortunately we still have some of those today in the form of bad personal cybersecurity solutions.
Personal Featured Pick Your Fediverse Social Media Adventure Migrating to the Fediverse from your existing social media platforms is a bit daunting. So let's arm you with some information for making a great choice.
Personal The Case of the Apple Gift Cards In January of 2020 I was a cybersecurity professional, and my wife was an account. We both know better, but we nearly got taken by a gift card scam.
Personal Featured Rethinking Your Social Media Experience Is the ban of TikTok the signal for you to rethink your social media habits? Why not?
Cybersecurity Cyber Disinformation Month Wrap-Up Cybersecurity Awareness Month is in the mirror officially. This is my "Disinformation" wrap-up post for all the bad ideas you may have heard this month.
Cybersecurity What Driving Can Teach Us About Cybersecurity Who are you sharing the road with? Is their security program even drivable? Do they even have a license? There's plenty to think about as we look at what driving can tell us about cybersecurity.
Cybersecurity Bad Cybersecurity Advice Don't scan QR codes! Use an email to log in! Look for misspellings in emails! Just stop, please?
Cybersecurity Powerful Yet Overlooked - DNS as a Security Solution Almost nothing you do online works without DNS. It is ubiquitous. But have you ever thought about DNS as part of your security program? Controlling how it is used can make a significant impact on your environment.
Linux GRUB's No Good, Very Bad, Day (at the hands of Microsoft) A new Microsoft patch - for a 2 year old vlun - is preventing dual-boot computers from booting Linux. Monopolies at work again. Let's break that cycle.
Cybersecurity Lather, Rinse, Repeat - the Never Ending Cycle of Good Cybersecurity Like your doctor says when you go in for that annual physical you skipped: eat more veggies, get more exercise, sleep well. The same holds true for good cybersecurity - it's the repetitive, boring stuff that often matters most.
Cybersecurity The Internet of (Crap) Things Everything today from your furnace to your toilet can be Internet connected, but why do it? If you do connect them, how do you do so securely?
Linux First Activities On Your First Linux Computer Just like with any brand new tech, there are some setup things to be done. Here's a good checklist for that first couple activities on your new (or newly installed) Linux computer.
Linux Installing Linux For the First Time Installing Linux for the first time can feel daunting. It's also quite freeing and rewarding. Let's get you started.
Personal To Sync Or Not To Sync... That is the question. Do you trade private data for convenience or not?
Personal Want Private, Secure Communications? Your Choices Are Limited Your email service reads your emails. Your test messages are plain-text. Your phone calls can be tapped. How do you communicate securely and privately?
Cybersecurity The Fallacy of a Safe Encryption Backdoor Governments the world over want mandatory backdoors into encrypted communications. But there's no such thing as a secure way to do this.