• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • TalesFromTheGrid
  • Videos ‘n Stuff
  • My Book
  • Training
  • Places
  • Blog
  • Contact
Select Page

My MEDIUM Article: Is it even possible to be “completely secure”?

Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9

My MEDIUM Article: Cybersecurity Trends for 2019 — The Good and The Bad

Defense, Devil's Advocate, MEDIUM Articles, Privacy, Tech

Check out my latest article on MEDIUM: Cybersecurity Trends for 2019 — The Good and The Bad

Physical Security Product Review – Portable Door Locks (PDLs) – Rishon Addalock VS. MasterBolt Travel Door Lock Security, Compared

Defense, Humans, Personal Security, Tech, Travel, Women in Tech

Introduction I travel a lot, sometimes alone. I have left hotels almost immediately after checking in because I felt unsafe with the accommodations. Sometimes a hotel will assign a room to two people by mistake, and one person walks in on the other using a valid key...

The Importance of Security Awareness Training and the Impact of Attack Demonstrations

Business, Defense, enterprise, Humans, OSINT, Personal Security

In “The Importance of Security Awareness Training”, SANS says: “One of the best ways to make sure company employees will not make costly errors in regard to information security is to institute company-wide security-awareness training initiatives...

Department of Commerce – Cybersecurity Solutions for Small Businesses (Phoenix)

Business, Defense, Humans, Mobile and Device, Privacy

Here, you can download the slides in PDF format from my talk at the U.S. Chamber of Commerce’s Small Business Series in Phoenix, AZ on 2017-12-14 My talk was entitled, “The Hidden Threat:  Security attacks that small businesses need to worry about”...

Mobile Device Security for International Travelers – Part 3: How to “Clean-up” Your Mobile Devices After International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...
« Older Entries
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
  • MoreTrueFacts
  • Tales From The Grid

Search

Recent Posts

  • Tales From The Grid: Episode 58: CAPTCHA Cannot Prevent Robot Uprising
  • Tales From The Grid: Episode 57: Solidarity Loophole Recursion
  • Tales From The Grid: Episode 56: Jitter Protocol
  • Tales From The Grid: Episode 55: Solidarity Protocol
  • More True Facts: The Great Hanoi Rat Loophole
Follow @aprilwright

Site Privacy Policy

  • Facebook
  • X
  • RSS