Top 5 Lessons from WoodworkingI love building things. I build things from code at work, and from wood at home. Sharing my top 5 lessons for building stuff.Jul 4, 2021Jul 4, 2021
Value of Beginning AgainAnd now, something completely different — A lesson I’ve learned during the tragedy of the pandemic. The importance of Beginning Again.Jul 3, 2021Jul 3, 2021
Building Positive Security CultureThis post sketches some essential ingredients for growing and sustaining a positive security culture around software engineering.Aug 25, 2020Aug 25, 2020
Ditch the token, log in better.See how Goldman Sachs Transaction Banking approaches multi-factor authentication, making it easier and more secure.Jul 23, 2020Jul 23, 2020
Authentication Maturity Model (Part 1)My last post outlines how to use maturity models to describe the robustness of an enterprise cybersecurity practice. It describes an…Sep 10, 2018Sep 10, 2018
A Framework for Maturing SecurityThis year I’ve had the good fortune of spending quality time with customer security teams. Over the last few days, I’ve been thinking about…Aug 30, 2018Aug 30, 2018
Published inBuilt to AdaptCombatting Adversarial AI — Which Side Are You On?Forget about AI taking our jobs, let’s worry about the attackers aiming to weaponize it.Apr 19, 2018Apr 19, 2018
Published inBuilt to AdaptSecurity: The Offensive Line of EnterpriseIt’s time to rethink classic approaches to security, and build a playbook that ensures safety and success.Nov 14, 2017Nov 14, 2017
Published inBuilt to AdaptA More Practical Approach to Encrypting Data In MotionJustin Smith, Pivotal’s Chief Security Officer for Product, breaks down encrypting data in motion into a more approachable understanding.May 9, 20171May 9, 20171
The truth about password complexityI’ve had a stigmata-like experience recently with passwords. This post, and maybe one more are a means of capturing my rant.Sep 5, 2016Sep 5, 2016