• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • TalesFromTheGrid
  • Videos ‘n Stuff
  • My Book
  • Training
  • Places
  • Blog
  • Contact
Select Page

The Usability Wall: Why Passkeys and Yubikeys are Failing the ‘User Test’ and Sending MFA Back 10 Years for End-Users

Business, Defense, enterprise, Hacking, Passwords, Social Engineering

We were promised a future without passwords. It was supposed to be magical: a frictionless digital life where phishing was impossible, and we didn’t have to remember a random string of characters containing a symbol, a number, and a capitalized vowel. —— We InfoSec...

Physical destruction of data storage – Things to consider

Business, Defense, enterprise, Mobile and Device, Privacy, SDLC, Tech, Tips

I was asked recently to provide some thoughts on physical data destruction for an article David Spark (CISOseries.com, Twitter: @dspark, LinkedIn) was working on. Here are my complete musings on the subject: The initial step when considering data destruction is...

My MEDIUM Article: Is it even possible to be “completely secure”?

Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9

Video: Social Engineering At Work – How to use positive influence to gain management buy-in for anything @DerbyCon

Business, Career, Conferences, enterprise, Humans, Media, professionals, Social Skills, Talks, Tips

The first published recording of “Social Engineering At Work – How to use positive influence to gain management buy-in for anything”. Recorded at DerbyCon 2018, also presented at Social Engineering Rhode Island, GRRCon, CircleCityCon, BSM, etc....

Social Engineering At Work: Some books that have helped me

Business, Career, Humans, Social Engineering, Social Skills

I speak about using “Social Engineering at work” – how to gain and utilize positive influence to get things done – to help others learn how to play “the corporate game”, how to not lose themselves when practicing good office...

The Importance of Security Awareness Training and the Impact of Attack Demonstrations

Business, Defense, enterprise, Humans, OSINT, Personal Security

In “The Importance of Security Awareness Training”, SANS says: “One of the best ways to make sure company employees will not make costly errors in regard to information security is to institute company-wide security-awareness training initiatives...
« Older Entries
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
  • MoreTrueFacts
  • Tales From The Grid

Search

Recent Posts

  • The Usability Wall: Why Passkeys and Yubikeys are Failing the ‘User Test’ and Sending MFA Back 10 Years for End-Users
  • More True Facts: The Winged Heroes of WW2’s “Station X”
  • Tales From The Grid: Episode 59: The Barnum Effect Quarantine
  • Tales From The Grid: Episode 57: Solidarity Loophole Recursion
  • Tales From The Grid: Episode 56: Jitter Protocol
Follow @aprilwright

Site Privacy Policy

  • Facebook
  • X
  • RSS