• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • My Book
  • Schedule
  • Videos+Writings
  • Training
  • Consulting
  • Blog
  • Contact
Select Page

Department of Commerce – Cybersecurity Solutions for Small Businesses (Phoenix)

Business, Defense, Humans, Mobile and Device, Privacy

Here, you can download the slides in PDF format from my talk at the U.S. Chamber of Commerce’s Small Business Series in Phoenix, AZ on 2017-12-14 My talk was entitled, “The Hidden Threat:  Security attacks that small businesses need to worry about”...

Friday Social Engineering Humor…

Humans, Humor

5 reasons Cybersecurity is a fantastic career for female students to consider

Career, degree, professionals, Women in Tech

Cybersecurity is an exciting and growing field of study and employment, expecting an increase to an estimated 1.5 million unfilled jobs within the U.S. by 2020 (Frost & Sullivan, 2017).  These are generally high-paying jobs, which are challenging, interesting, and...

Mobile Device Security for International Travelers – Part 3: How to “Clean-up” Your Mobile Devices After International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...

ISSA New England 2017 – A Secure Foundation: Why building security into everything ‘from the start’ matters by April C Wright

Uncategorized

A Secure Foundation: Why building security into everything ‘from the start’ matters Thank you for joining ISSA for the September 2017 meeting! Have a look around the site, and let’s get a conversation going:  https://twitter.com/aprilwright   Here is...

DefCamp 2017 Romania: INTERVIEW with April C Wright: “Infosec is like fighting an uphill battle, and it definitely takes a village”

Business, Defense, Interviews, Media, Software, Stories

The DefCamp Romania 2017 infosec conference organizers wanted to explore the topic of internal and external challenges that organizations face nowadays in terms of securing their assets and keeping them safe. I was interviewed, since I’ll be speaking there in...

Mobile Device Security for International Travelers – Part 2: How to Maintain Privacy During International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...

Must-have Mac OS X Software to Protect Your Mac Computer

Apple, Defense, MacOS, Software, Tips

From the moment I first started using MacOS X, I fell in love.  It was like my long-time favorite Macintosh <= v9 had spawned with my other love, NeXTStep, to create an exquisite underlying The Jurassic Park scene where the girl says “This is a UNIX system! I...

Mobile Device Security for International Travelers – Part 1: How to prepare your phone and tablet for privacy and peace of mind while abroad

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

If you will be traveling internationally, you might be wondering how to protect your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY NETWORK you connect to (including your home network) is potentially...

3 Inspiring Stories of Influential Women in Technology

History, Humans, Stories, Women in Tech

1. Ada Lovelace is known as the first programmer in the history and pioneer of the modern computing. Her name is quite famous in the developers’ realm, but do You know everything? Know Everything About World’s First Programmer, Ada Lovelace   2. Margaret...
« Older Entries
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
Follow @aprilwright
Black Hat USA 2020 Trainer Banner

Recommended Gear:

Search

Recent Posts

  • Physical destruction of data storage – Things to consider
  • 31 Days of Security Awareness in #DevSecOps – DAY 22 by Alyssa Miller (LinkedIn Post)
  • If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)
  • New talk posted to my media page!
  • I’m quoted in CSO Online article: 25 API Security Tips You’re Probably Not Considering

Tags

Android Apple authenticity centralized secrets choice nudging Defense empathy Hacking Hak5 Home Security Hostile Networks International Travel introversion introvert iOS ipad iphone Locks Locksport Mobile Devices office politics passwords PDL Penetration Testing Personal Security Physical Security Pineapple Nano Portable Door Lock privacy Protect my devices Protect yourself Recommendations smartphone Social Engineering Social Media Social Skills Software Tips Travel Traveling Abroad Travelling abroad Travel Security updates USB Thumbdrives Windows Mobile
Tweets by aprilwright

Search

Follow @aprilwright
  • Facebook
  • X
  • RSS