As some of you know, I quit my job recently. I started there as a senior developer 6 years ago, and left as CTO, with stops along the way as Director of Technology and VP of Technology. Now I find myself faced with a choice. Do I try to find
I originally started this blog post off with an apology. An apology about how I might not be the toughest woman you know, but I’m respected in the tech community, and the headline was clickbait and blah blah blah. I deleted it all, because I am, actually, probably, one of
I recently posed this question on Twitter, and some of you took the time to reply, so I wanted to share some of your responses here.
Popular social media management system Buffer has confirmed that they’ve been compromised, with weight-loss SPAM being sent from customer Twitter and Facebook accounts. Here’s what you need to do to keep your accounts (and potentially your customer accounts) safe.
I wear an 8GB USB flash drive on each ear as earrings. I have for years, and they always get a lot of attention – at tech conferences, sure, but I mean everywhere. In the elevator in my office building, on the train, at social events, you name it.
When I talk about risk as it relates to web applications, people usually assume I’m talking about hardening applications from hackers, spammers and other ne’er-do-wells. While malicious attacks are absolutely a non-trivial part of risk management, there’s a lot more to it that’s just as important.