You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.
Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.
Paying Ransomware is Harmful: Invest in proactive defense instead.
Paying the pirates has never been a good idea. The long history shows that paying the ransom only increases the financial incentives for more ransoms. Here is how you can use Threat Actor / Capability modeling and practically free counter measures to protect yourself.
Top 5 Cyber Security Self-Defense Tips for Businesses with Custom Applications
Since there is no Internet coast guard coming to your aid, here are the top five tips for your company to be better prepared for your own self-defense against cyber attack.
Cross-site Scripting Injection Attacks Using SVG Images
Lava lamps providing randomness for security!
Lava Lamps as a security tool is an old idea, once covered by a patent. This is why I proudly display a Lava Lamp in my office within my web cam shot.
Testing: Your Future Self Will Thank You
Testing, while not always glorious, is a vital part of a good code base. Tests and code should go hand in hand.
Streamlining Workflows With Docker
Working on numerous projects can require significant time to set up locally. With Docker, we have streamlined this process to mere minutes.
Practical APPSEC starts with people first, processes second, and technology last
Technology purchases cannot solve application security. Improving security is a matter of people, processes, and technology. Here's how to invest developer education and processes first.
Financial Plan for a New Computer Under Warranty
As a computing professional, top end computers are a necessity for your livelihood. Here's how setting aside just $69/month will ensure you can buy a new computer at any time and have the funds for guilt free technology splurges.
Development time is money, therefore I RAID
Why I optimize for redundancy via RAID and multiple computers as a developer for whom development time is money instead of relying on a single high end laptop.