• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • TalesFromTheGrid
  • Videos ‘n Stuff
  • My Book
  • Training
  • Places
  • Blog
  • Contact
Select Page

My MEDIUM Article: Is it even possible to be “completely secure”?

Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9

My MEDIUM Article: Cybersecurity Trends for 2019 — The Good and The Bad

Defense, Devil's Advocate, MEDIUM Articles, Privacy, Tech

Check out my latest article on MEDIUM: Cybersecurity Trends for 2019 — The Good and The Bad

Physical Security Product Review – Portable Door Locks (PDLs) – Rishon Addalock VS. MasterBolt Travel Door Lock Security, Compared

Defense, Humans, Personal Security, Tech, Travel, Women in Tech

Introduction I travel a lot, sometimes alone. I have left hotels almost immediately after checking in because I felt unsafe with the accommodations. Sometimes a hotel will assign a room to two people by mistake, and one person walks in on the other using a valid key...

The Importance of Security Awareness Training and the Impact of Attack Demonstrations

Business, Defense, enterprise, Humans, OSINT, Personal Security

In “The Importance of Security Awareness Training”, SANS says: “One of the best ways to make sure company employees will not make costly errors in regard to information security is to institute company-wide security-awareness training initiatives...

Department of Commerce – Cybersecurity Solutions for Small Businesses (Phoenix)

Business, Defense, Humans, Mobile and Device, Privacy

Here, you can download the slides in PDF format from my talk at the U.S. Chamber of Commerce’s Small Business Series in Phoenix, AZ on 2017-12-14 My talk was entitled, “The Hidden Threat:  Security attacks that small businesses need to worry about”...

Mobile Device Security for International Travelers – Part 3: How to “Clean-up” Your Mobile Devices After International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...
« Older Entries
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
  • CATENT Pending
  • MoreTrueFacts
  • Tales From The Grid

Search

Recent Posts

  • More True Facts: For OSCAR consideration – The Emu War
  • More True Facts: The 1904 Olympic Marathon – a real event that was interrupted by a pack of dogs chasing humans
  • More True Facts: That time Toronto lost a war against raccoons aka “The Tiny Arms Race”
  • CAT-ENT PENDING: Meet The Team! This week we feature “Barnaby”
  • CAT-ENT PENDING: Dr Chipmunk’s Late Night Commercial
Follow @aprilwright

Site Privacy Policy

  • Facebook
  • X
  • RSS