PinnedThe Evolution of Authentic Human Connection in the Age of AIIn our rapidly advancing technological landscape, we find ourselves at the edge of what I feel is a profound transformation. Today, I want…Sep 25Sep 25
PinnedHas AI’s Critical Flaw Been Forever Removed?For a free masterclass in patience, marketing, newsjacking, and playing the rebel, look no further than Apple’s WWDC 2024, where the…Jun 12Jun 12
The Power of Stories: What Veterans Really Need This Veterans DayIn our fast-paced digital world, we often forget the simple power of being present. As both a veteran and technology professional, I’ve…Nov 9Nov 9
Clarity is Key: Why Communication Strengthens Your Cyber DefensesLiving in Alabama, I’ve learned firsthand the importance of preparedness. Tornado season’s unpredictable threats demand that we remain…Feb 21Feb 21
Threat Hunt. . .Or ElseIf you’re not threat hunting, you’re missing out, but you know who’s not?Jan 10, 2022Jan 10, 2022
Four Questions Your Information Security Team Should be AskingThe key to succeeding in information security and cyber threat intelligence is recognizing what you’re dealing with, and adapting…Jan 6, 2022Jan 6, 2022
Cyber Threat Predictions: How to Cut Through the NoiseAnother Year, Another Cyber Threat PredictionJan 6, 2022Jan 6, 2022
Cyber Threat Intelligence Professionals: The Tired, Overworked, Under-Appreciated Hope of 21st…Cyber Threat Intelligence Professionals: We Need You!Jan 1, 2022Jan 1, 2022
Why you should consider joining an ISACWhy should one consider joining an ISAC?Dec 30, 2021Dec 30, 2021