• Twitter
  • LinkedIn
  • Email
0 Items
April C Wright
  • About
  • My Book
  • Schedule
  • Media
  • Training
  • Consulting
  • Blog
  • Shop
  • Contact
Select Page

My MEDIUM Article: Cybersecurity Trends for 2019 — The Good and The Bad

Defense, Devil's Advocate, MEDIUM Articles, Privacy, Tech

Check out my latest article on MEDIUM: Cybersecurity Trends for 2019 — The Good and The Bad

Audio Blog: What is Identity?

Personal Security, Privacy, Social Media

Today on the blog, we discuss: What is Identity? Find out more at my sister-site, IncreaseYourSecurity.org

How To Change Your Facebook Settings To Opt Out of Platform API Sharing

Personal Security, Privacy, Social Media

In case you missed it, news that “private” user data was harvested from 50 million profiles by a company called Cambridge Analytica hit the major news media this week. Data was gathered through a “survey” that exposed data about the user and...

Audio Blog: What are things you should not post on social media?

Personal Security, Privacy

Today, we have a new audio blog about the types of items that, when shared, can become problematic. Be sure to visit my sister-site about social media and personal privacy at http://increaseyoursecurity.com/ Things to not post on social media...

Department of Commerce – Cybersecurity Solutions for Small Businesses (Phoenix)

Business, Defense, Humans, Mobile and Device, Privacy

Here, you can download the slides in PDF format from my talk at the U.S. Chamber of Commerce’s Small Business Series in Phoenix, AZ on 2017-12-14 My talk was entitled, “The Hidden Threat:  Security attacks that small businesses need to worry about”...

Mobile Device Security for International Travelers – Part 3: How to “Clean-up” Your Mobile Devices After International Travel

Defense, Mobile and Device, Personal Security, Privacy, Tips, Travel

  If you will be traveling internationally, you might be wondering how to protect your privacy and securely use your mobile devices (especially phones and tablets) while abroad. First, you must understand and accept that EVERY place you visit (including your home...
« Older Entries
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
Follow @aprilwright
Black Hat USA 2020 Trainer Banner

Recommended Gear:

Search

Recent Posts

  • Physical destruction of data storage – Things to consider
  • 31 Days of Security Awareness in #DevSecOps – DAY 22 by Alyssa Miller
  • What Are My Photos Revealing About Me? You may be accidentally sharing personal information in your photos (an important Guest Post)
  • If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)
  • New talk posted to my media page!

Tags

Android Apple Boston business career Cats centralized secrets Defense devil's advocate enterprise female Hak5 Hostile Networks infosec International Travel interview iOS ipad iphone ISSA keys MacOS media Mobile Devices New England organizations passwords Personal Security privacy Protect my devices Protect yourself quotes Recommendations security issues smartphone Social Engineering Software tablet Talks Tips Travel Traveling Abroad Travelling abroad Windows Mobile women
Tweets by aprilwright

Search

Follow @aprilwright
  • Facebook
  • Twitter
  • RSS