Information Asymmetry & InfoSec: Negative Fun. Limited Profit.
In Wealth of Nations, Adam Smith starts to build out a concept called “Information Asymmetry” concerning free markets. I say he “starts...
Mountain Biking: The End of My Erotic Cycling Journeys with FB2016b.3
Every now and then I write some thoughts on mountain biking products and solutions that are working for me. This is such a post. You...
Towards a Better Solution Presentation and Demo
I’ve talked, written, and tweeted my ideas on presenting technical solutions before. This post is along those same lines with new...
Embracing Authentic Communication and Nixing Corporate Speak
Like most people, I’m constantly looking to improve my written and oral communication skills. As such, over the years I’ve made a number...
Mountain Biking: Continued Erotic Journeys with FB2016b.2
In 2015, I began the process of building a new bike which I documented in a blog post. The build was anchored by a Nine Air9 RDO frame. ...
Sabbatical: Thoughts on Exiting and Re-Entering InfoSec
In 2018, I stepped away from working for 7 months. The reasons were personal but largely burn-out-related (you can see it in this site's...
Understanding The World of Resellers
In the IT industry, whenever you want to purchase hardware, software, and sometimes services, there are two ways you can do it: direct...
Ear Whacks Vol. 4 Issue 1
It’s been quite a while since I’ve published this list so it will include more artists. Here’s what music has been tickling my ears for...
Clear Messaging for AppSec Success
I caught S03E05 of the Application Security podcast the other day; “SAST, DAST, and IAST. Oh my!” It featured Pete Chestna...
A Security Architect: The Key Attributes
I’ve been doing a lot of thinking lately about my years in Information Security. I think it’s pretty normal for people my age with my...