// securityjawn.com

Security Jawn

// thoughts on tech, security, history and everything in between

Jawn is a Philadelphia slang word which can represent a person, place or thing.

[ ENCRYPTION ]
2024-12-15// PRIVACY

Why Encryption is Good

Our data is tracked, cataloged, and compiled into profiles — and with every breach, more of it leaks out. Encryption is our best line of defense. Here's why it matters, how it works, and why a government backdoor would be a disaster.

2023-12-03// PRIVACY

Giphy…

That GIF app integrated into your keyboard has access to everything you type. Here's why that level of permission is worth thinking twice about.

2023-07-12// SECURITY

Phishing

Trust no one. Phishing has advanced well past obvious red flags. Cyrillic homograph attacks, targeted credential harvesting, and more — here's what to watch for.

2023-04-15// INFOSEC

Life at an Enterprise

Two years behind the curtain at a large enterprise org. Lessons learned on access control, asset management, and what actually matters when you're on the inside.

2020-12-30// VULNERABILITY

Vulnerability Management

From asset discovery to CVSS scoring and remediation tracking — a complete breakdown of what a mature vulnerability management program actually looks like.

2020-06-02// CLOUD

We've Moved to the Cloud — Now What?

Moving to the cloud doesn't mean you're secure by default. The same fundamentals still apply — here's exactly what you need to layer on top.

2020-05-06// CLOUD

Is It Time to Move to the Cloud?

The pandemic forced a lot of organizations to go remote fast. Now that the dust has settled, here's how to think through whether a cloud migration is right for your org.

2020-04-03// RISK

Technical Risks of Third Parties

Every vendor, contractor, and API integration is a potential attack vector. Here's how to think about third-party access and what every organization should be doing.

2020-02-01// SECURITY

What Do You Gain by Performing a Penetration Test?

Vulnerability scans tell you where the holes are. Penetration tests tell you what happens when someone actually tries to walk through them.

2019-09-14// NETWORKING

An Assessor's Thoughts on Split Tunneling

Should your VPN users have split tunneling enabled? The answer depends on compliance requirements, trust level, and your organization's risk tolerance.

2019-06-08// CAREER

Advice for Prospective Info Sec Careers

Info Sec consulting vs. Security Engineering — two very different paths. Here's an honest breakdown of what each requires and what it takes to break in.

2019-05-09// NETWORKING

Zero Trust Architecture and the Future of Networking

Perimeter defense alone isn't enough. Zero Trust — never trust, always verify — is the security architecture of the future. Here's what it is and why it matters.

2019-05-05// TIPS

Tips for Everyday Security

Ten practical steps any person can take to make their digital life harder to crack — from password managers to public WiFi habits that actually matter.