• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • My Book
  • Places
  • Videos+Writings
  • Training
  • Blog
  • Contact
  • TalesFromTheGrid
Select Page

Physical destruction of data storage – Things to consider

Business, Defense, enterprise, Mobile and Device, Privacy, SDLC, Tech, Tips

I was asked recently to provide some thoughts on physical data destruction for an article David Spark (CISOseries.com, Twitter: @dspark, LinkedIn) was working on. Here are my complete musings on the subject: The initial step when considering data destruction is...

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Defense, Humans, Law, Mobile and Device, OPSEC, OSINT, Personal Security, Privacy, Tech, Tips

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (And how long can it stick around?) By: Lauren Kirchner On the evening of May 29, New Yorkers went out by the thousands for the first big day of protests following the murder of...

My MEDIUM Article: Is it even possible to be “completely secure”?

Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9

Department of Commerce – Cybersecurity Solutions for Small Businesses (Phoenix)

Business, Defense, Humans, Mobile and Device, Privacy

Here, you can download the slides in PDF format from my talk at the U.S. Chamber of Commerce’s Small Business Series in Phoenix, AZ on 2017-12-14 My talk was entitled, “The Hidden Threat:  Security attacks that small businesses need to worry about”...

Mobile Device Security for International Travelers – Part 3: How to “Clean-up” Your Mobile Devices After International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...

Mobile Device Security for International Travelers – Part 2: How to Maintain Privacy During International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...
« Older Entries
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover

Search

Recent Posts

  • Tales From The Grid: episode 30 “The Cricket”
  • Tales From The Grid: episode 29 “The Polygon”
  • Tales From The Grid: episode 25 “The Self Help Protocol”
  • Tales From The Grid: episode 27 “The Can of Bubbles”
  • Tales From The Grid: episode 28 “Glowing Penicillin, in theory”
Follow @aprilwright
  • Facebook
  • X
  • RSS