-
My Time as Mentor at NewChip
This week, Newchip Accelerator has become bankrupt. Here are my thoughts about my time as a mentor working with two…
-
Painful Common Password Attacks Vectors
Attacks utilizing user passwords represent 95% of all cyber security incidents. You cannot protect yourself against something you don’t know.…
-
Cybersecurity and Emotions
What does cybersecurity have to do with emotions? One of my latest conference submissions dives deep into this question! Watch…
-
Identity Management in the Music Industry
The Music industry has strict requirements on cybersecurity. Here is how UCS can help fulfill them and reduce workload with…
-
Be Safe: Take Control of your Digital Identity Now
Data breaches are a Weekly ritual. Here are three easy steps to take care of your digital identity and why…
-
Why should we care about digital identities?
In a world where our digital accounts, our digital identities, get stolen by the second, we should protect them from…
-
Grit, Vision, Refocus in Life, IT, and the Boardroom
5000..2500..1000..50..10..5..4..3..2..1 Running my first 5k race has been a challenging experience. There were numerous moments when giving up felt like…
-
Free Software to run your Business or Home
Running your personal cloud can be easy. A short presentation on why and what software to use to quickly build…
-
The Hidden Costs of Logging In
My workday probably starts the same way as most people’s. Yet, logging in over and over comes with a hefty…
