In the News

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 5/19/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 5/19/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week. Featured Analysis Featured article analysis: Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs This article from BleepingComputer details a

    read more

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 5/5/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 5/5/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week. Featured Analysis Featured article analysis: Unsophisticated cyber actors are targeting the U.S. Energy sector The Cybersecurity and Infrastructure Security

    read more

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/21/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/21/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week. Featured Analysis Featured article analysis: Former Disney employee who hacked Disney World restaurant menus in revenge sentenced to 3

    read more

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/14/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/14/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week. Featured Analysis Featured article analysis: CVE, global source of cybersecurity info, was hours from being cut by DHS

    read more

  • What is Mastodon?

    I’m loving mastodon and I’m huge fan. With everyone comparing it to Twitter it makes describing it more challenging. You have to forget the idea of Twitter to really understand it. This video does a great job of quickly describing it.

    read more

  • ChatGPT Learning Possibilities

    …and ways people can take advantage of this new artificial intelligence. I’ve been hearing a lot about ChatGPT and I wanted to explore more of what it can do. I wanted to see how easy it was to use myself. I created a user account and typed in my prompt: write an information article about

    read more

  • Software Bill of Materials (SBOM)

    A software bill of materials (SBOM) is a comprehensive list of all the individual components that make up a piece of software. This list includes both the source code and any external libraries or other dependencies that are necessary for the software to function properly. Having an SBOM is important for several reasons. First, it

    read more

  • Cybersecurity Articles | Week of October 24, 2022

    TechCrunch, Inside TheTruthSpy, the Stalkerware network spying on thousands by Zach Whittaker (Oct 26) | A database containing about 360,000 unique android devices exposed. TechCrunch, Hive Ransomware gang leaks data stolen during Tata Power cyberattack by Carly Page, Jagmeet Singh (Oct 25) | Tata Power, which serves more than 12 million customers through its distributors,

    read more

  • Great Recent Articles

    Nature: Why scientists are turning to Rust by Jeffrey M. Perkel (Dec 11, 2020) Why this is interesting. RUST is seen as more secure than other older programming languages. The Trade Secrets Network: Struggles with Insider Risk Program Stakeholders by Stacey Champagne (Sep 9) Bleeping Computer: Web browser app mode can be abused to make

    read more