• LOGIN
  • No products in the cart.

Blog 3

Another blog style

Entering the “Cloud Security” Fray

May 23,25

This is one of my favorite programs that NPR does, and if you haven’t partaken of it I highly suggest …

Read More

A Crazy Idea Regarding the Obama Administration and Security

May 23,25

So my buddy Steve brought me a small sample of Jamaican Blue Mountain coffee today. Evidently a co-worker was brewing …

Read More

The Difference Between CSRF and Clickjacking

May 23,25

For Facebook to be as big as it is, it seems like it’d be easier to answer the question that …

Read More

How Does One Explain SQL Injection to a Non-Techie?

May 23,25

I’m often asked by my smart friends: The answer is simple: religion’s business is to get into my business. When …

Read More

Contemplating Confirmation Bias

May 23,25

At this point, FriendFeed’s real purpose is to give users a glimpse of what’s to come for social networking in …

Read More

How to Build a Cybersecurity Career [ 2019 Update ]

May 23,25

Few Christians have ever heard in church, or read themselves, the story of the Cannanite woman with a sick daughter. …

Read More