Content
Strategic insights on blockchain, AI, and leadership in disruption.
career Posts
172 posts
Hacking Your InfoSec Job Hunt
If you missed it, I posted a podcast episode on my job hunt as part of my podcast, Building a Life and Career in Security Podcast. TL;DR? I…
Matt Decker
Welcome to Season 2 and Episode 17 of the Building a Life and Career in Security Podcast.
Project: Free SSL Certificate
Unlock the power of SSL certificates with this comprehensive guide to obtaining a free, open-source SSL certificate using Let's Encrypt. Learn foundational Linux skills, cloud server setup, and boost your cybersecurity expertise with this impactful project.
What Is Your Competitive Advantage?
Discover your unique competitive advantage and how to leverage it for career success. Learn to identify what sets you apart and use it to stand out in the job market with practical tips and insights.
Project: VPN
This is the second in a series of projects you can use to improve your security stills. The ideas of these projects is something relatively…
How Can I Help You?
Explore insights from the "How Can I Help You?" survey, revealing trends in security careers and reader demographics. Discover how a revamped assessment now tailors learning paths for aspiring professionals.
How Uber Gave Me Faith in Humanity
Uber is a disruptive technology. Over the past few years, many taxi and limo drivers have been impacted by the ease of hailing a ride…
4 Ways to Evaluate Your Job
Discover four essential ways to evaluate your job, focusing on your boss, mobility, company pride, and skillset growth. Learn how to weigh these factors to make informed career decisions.
Jay’s Best of 2015
Explore Jay's top blog posts from 2015, featuring insights on security and DevOps, the CISO talent gap, and more. Discover engaging content and the stories behind each article.
How To Move From Development to Security
Discover how developers can transition into the thriving field of application security with this guide. Learn essential skills, explore the OWASP Top 10, and find resources to enhance your security mindset.
Why We Will Never Secure The Internet of Things
Explore why securing the Internet of Things (IoT) remains elusive, as most devices, made by unknown manufacturers, lack security measures. Discover the need for universal security standards.
Securing Amazon Web Services
Discover a comprehensive guide to securing your Amazon Web Services environment. This blog post compiles essential tips and resources to protect AWS accounts, EC2 instances, S3 buckets, and more.