…or did they? Where we live in Cape Town, we’re surrounded by houses. And, somewhere in this maze of walled dwellings live no less than 3 cats. There’s two black ones, and there’s one that’s kinda grey/brown. All of them think our yard is the best place in the world to play, hunt…and, not so […]
Stepping in mythical maturity mud puddles
While this is something I’ve written about before, it’s not normally something that comes up quite so strongly and quite so often in the same day. That “something” is the myth of some magical level of maturity in your security program when “things will happen.” When we get [magical maturity level], then we can be […]
Avoiding the training course hangover
Training courses have lots of good things going for them, but one of the bad things that can happen – especially in live, in-person training courses – is that there’s so much material to cover in the 3 or 5 days of sessions, you’re almost always bound to hit that point exemplified by the classic […]
Can you really make security architecture a habit?
Interestingly enough, I was listing to a podcast yesterday on how to train your brain regarding habits with Tara Swart, a neuroscientist and senior lecturer from MIT and Nir Eyal, a behavioral designer. I really enjoy all this psychology and neuroscience stuff, as you might’ve noticed, because it’s one of the best ways I’ve discovered […]
A potential cure for cybersecurity envy
Since Thanksgiving is now in the rear-view mirror, we can start talking about what’s next for the end of the year. And for a lot of people, that means shopping for Christmas. One of the things I remember about being a kid was that one of my friends in particular used to get all the […]
- « Previous Page
- 1
- …
- 29
- 30
- 31
- 32
- 33
- …
- 57
- Next Page »