In holding myself accountable to my own call-to-action, I have dedicated a page to share all of the diversity-centric resources I have collected over the years. From How-To guides to sites that use lexiconic analysis of job postings to ensure they are bias-free, to awareness training tools, to volunteer organizations.
As a hiring manager, how does someone make a person go through three video interviews, do two coding assignments, be so impressed with the coding that they then fly the person up for in-person interviews, and only then decide the coding skills aren’t exactly what they are looking for?!?
It’s hard to believe it’s been a year already. Twelve months ago, I took the leap and decided that it was time to start my own blog, and now, here we are celebrating the 1st anniversary. Over 110,000 visits later, I am shocked, honored, and above all, humbled that this little pet project has been […]
Honored to have had the privilege to write the forward to the third book of Morey Haber‘s trilogy of enterprise attack vectors. This installment, written with Darran Rolls, discusses the details of identity-based attacks and how to protect against them. I’ve written frequently about the necessity of adequately managing the digital identities of our enterprise […]
This is an abbreviated version of my Identity Catechism piece that I wrote in early 2019. This piece focuses on the three key topics to focus on when planning and building an Identity Management Program. While many continue to hold onto the concept of the hardened perimeter, the stark reality is that we live in […]
This is an interview with George Hulme is an internationally recognized writer who has been covering the technology and information security space for more than 20 years, with pieces appearing in ComputerWorld, Network Computing, CSOOnline and a host of other print publications. In this Q&A we spoke with John Masserini, chief information security officer at […]
I’ve had just about enough of the fear mongering and lazy ‘reporting’ that’s been in the press recently around how two-factor authentication is broken. I’m not sure about you, but the way the doomsday preachers in mass media have torn apart two-factor authentication lately really has me wondering about the state of journalism anymore. I […]
For a number of years, I’ve had the honor of participating on the T.E.N. ISE® Sales and Marketing Breakfast panel at RSA. This year’s panel included some of my most esteemed colleagues in the industry and was once again a packed house with over 100 vendor representatives. The idea behind the panel is to provide […]