Whether or not you’re cutting the rug with Linda Lou or shakin’ like a leaf on a tree, one thing you need to know about requirements if you’re going to have a hope of tryin’ to prove they’re the right ones you should be including into your security program is that there’s 3 types: The […]
Johnny and the Mothers are playin Stompin’ at the Savoy in Vermont tonight
One movie that’s stuck with me since I was a kid was Johnny Dangerously. It’s so silly it’s still funny—especially the “C’mon shelf paper!” car chase scene…but that’s fodder for another email. If you’ve seen the movie, you might remember that a critical point was when Vermin, the aptly named villain of the story, discovers […]
Why “don’t click links” is credibility-killing cybersecurity advice
A couple of days ago, Mike Johnson, who was the former CISO of Lyft, started a thread on LinkedIn about bad cybersecurity advice that must die. His contribution to the thread was the oft espoused “don’t click links” mantra of many in our industry—including some people who I respect. I have to agree with him. […]
Cybersecurity measurement lessons from a famous French chef
This weekend, I had a problem. And that problem was a hungry family, a beautiful roast and how to not screw it up. Now you might remember that I like to cook, and I’m interested in learning how to do things properly. So, that means I like to get optimal results when I’m cooking anything—even, […]
Ever find yourself singing’ the boogie robots blues?
Both of my small children love the Minions movies, so there’s a good chance that when they get to watch TV and have to agree on something they can watch together, it’s going to be a movie filled with little yellow people running around in goggles and overalls. And the other day when they were […]
- « Previous Page
- 1
- …
- 38
- 39
- 40
- 41
- 42
- …
- 56
- Next Page »