Business, Defense, enterprise, Hacking, Passwords, Social Engineering
We were promised a future without passwords. It was supposed to be magical: a frictionless digital life where phishing was impossible, and we didn’t have to remember a random string of characters containing a symbol, a number, and a capitalized vowel. —— We InfoSec...
Business, Defense, enterprise, Mobile and Device, Privacy, SDLC, Tech, Tips
I was asked recently to provide some thoughts on physical data destruction for an article David Spark (CISOseries.com, Twitter: @dspark, LinkedIn) was working on. Here are my complete musings on the subject: The initial step when considering data destruction is...
Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software
Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9
Business, Career, Conferences, enterprise, Humans, Media, professionals, Social Skills, Talks, Tips
The first published recording of “Social Engineering At Work – How to use positive influence to gain management buy-in for anything”. Recorded at DerbyCon 2018, also presented at Social Engineering Rhode Island, GRRCon, CircleCityCon, BSM, etc....
Business, Career, Humans, Social Engineering, Social Skills
I speak about using “Social Engineering at work” – how to gain and utilize positive influence to get things done – to help others learn how to play “the corporate game”, how to not lose themselves when practicing good office...
Business, Defense, enterprise, Humans, OSINT, Personal Security
In “The Importance of Security Awareness Training”, SANS says: “One of the best ways to make sure company employees will not make costly errors in regard to information security is to institute company-wide security-awareness training initiatives...