tips

LastPass Security Breach. Here's What to Do LastPass Security Breach. Here's What to Do

Password management company LastPass has announced that it suffered a security breach in which attackers stole both encrypted customer account data (which is bad) and customer vaults containing encrypted usernames and passwords (which is much, much worse). On the positive side, the data of users who abided by LastPass’s defaults and created master passwords of at least 12 characters in...

/blog/lastpass-security-breach--here-s-what-to-do/
Jon Brown

articles

The Power of Letting Go: A Journey Through Imperfection and Trust in Entrepreneurship The Power of Letting Go: A Journey Through Imperfection and Trust in Entrepreneurship

In the fast-paced world of entrepreneurship, where innovation and adaptability are paramount, I often find myself reflecting on the transformative power of two seemingly simple yet profound concepts: imperfection and trust. These principles have shaped my entrepreneurial journey in ways I could never have imagined, teaching me that the art of letting go is not a sign of weakness, but...

/blog/power-letting-go-journey-through-imperfection-trust/
Jon Brown

articles

Good Cybersecurity policies, procedures, guidelines take time. They're not rushed and aren't rubber stamped Good Cybersecurity policies, procedures, guidelines take time. They're not rushed and aren't rubber stamped

Cybersecurity is no longer a luxury or an afterthought—it’s an absolute necessity. But how can you tell if the company you work for, as a security professional, truly values cybersecurity? Let’s explore some clear indicators that demonstrate a company’s commitment to implementing robust security practices in-house. A company passionate about cybersecurity doesn’t treat it as a one-time project or a...

/blog/good-cybersecurity-practices-arent-rushed-or-rubber-stamped/
Jon Brown

/blog/reflecting-on-2024-whats-next-in-2025/

Get the most talked about stories directly in your inbox