• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • TalesFromTheGrid
  • Videos ‘n Stuff
  • My Book
  • Training
  • Places
  • Blog
  • Contact
Select Page

Friday Social Engineering Humor…

Humans, Humor

5 reasons Cybersecurity is a fantastic career for female students to consider

Career, degree, professionals, Women in Tech

Cybersecurity is an exciting and growing field of study and employment, expecting an increase to an estimated 1.5 million unfilled jobs within the U.S. by 2020 (Frost & Sullivan, 2017).  These are generally high-paying jobs, which are challenging, interesting, and...

Mobile Device Security for International Travelers – Part 3: How to “Clean-up” Your Mobile Devices After International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...

ISSA New England 2017 – A Secure Foundation: Why building security into everything ‘from the start’ matters by April C Wright

Uncategorized

A Secure Foundation: Why building security into everything ‘from the start’ matters Thank you for joining ISSA for the September 2017 meeting! Have a look around the site, and let’s get a conversation going:  https://twitter.com/aprilwright   Here is...

DefCamp 2017 Romania: INTERVIEW with April C Wright: “Infosec is like fighting an uphill battle, and it definitely takes a village”

Business, Defense, Interviews, Media, Software, Stories

The DefCamp Romania 2017 infosec conference organizers wanted to explore the topic of internal and external challenges that organizations face nowadays in terms of securing their assets and keeping them safe. I was interviewed, since I’ll be speaking there in...

Mobile Device Security for International Travelers – Part 2: How to Maintain Privacy During International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...

Must-have Mac OS X Software to Protect Your Mac Computer

Apple, Defense, MacOS, Software, Tips

From the moment I first started using MacOS X, I fell in love.  It was like my long-time favorite Macintosh <= v9 had spawned with my other love, NeXTStep, to create an exquisite underlying The Jurassic Park scene where the girl says “This is a UNIX system! I...

Mobile Device Security for International Travelers – Part 1: How to prepare your phone and tablet for privacy and peace of mind while abroad

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

If you will be traveling internationally, you might be wondering how to protect your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY NETWORK you connect to (including your home network) is potentially...

3 Inspiring Stories of Influential Women in Technology

History, Humans, Stories, Women in Tech

1. Ada Lovelace is known as the first programmer in the history and pioneer of the modern computing. Her name is quite famous in the developers’ realm, but do You know everything? Know Everything About World’s First Programmer, Ada Lovelace   2. Margaret...

An Argument Against the Centralized Certificate Authority (or, How many mitigations does it take to keep secrets secure?)

Devil's Advocate, Passwords

I love playing devil’s advocate.  It helps with the analysis process. Here’s your dose of Devil’s Advocacy – just a malicious user story for your secure threat analysis: Sometimes it seems like we’re just encrypting secrets with more...
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
  • MoreTrueFacts
  • Tales From The Grid

Search

Recent Posts

  • More True Facts: The Great Hanoi Rat Loophole
  • More True Facts: Smuggled Dogs of the Cuban Aristocracy
  • More True Facts: Wojtek the Bear
  • More True Facts: The time we unleashed AI without guardrails
  • More True Facts: Parachuting Cats
Follow @aprilwright

Site Privacy Policy

  • Facebook
  • X
  • RSS