top of page
Search
Claire Tills
Oct 11, 20204 min read
Quality Research Part II: Publicizing Research
In my last blog post, I discussed (very generally) what can make research “bad.” Now I want to explore the second step of good research,...
Claire Tills
Oct 4, 20203 min read
We need more *Quality* Research
Not all research is created equally. Good research is methodologically solid and is presented to the world accurately.
Claire Tills
Dec 26, 20193 min read
We Need More Qualitative Research on Infosec
This blog post is inspired by an article by Sooraj Shah for the BBC published about a month ago. When I read the article, I was really...
Claire Tills
Nov 17, 20193 min read
On...not writing
There are countless reasons people write. There are maybe even more reasons people don’t. Twitter is chock full of writers’ woes about...
Claire Tills
Aug 7, 20183 min read
Conclusions from the Maersk case study
My last post was a case study of A.P. Møller-Maersk's communication is response to the NotPetya incident that took some of the company's...
Claire Tills
May 20, 20186 min read
Case Study: A.P. Møller-Maersk and NotPetya
A.P. Møller-Maersk's Chariman Jim Hagemann Snabe said on a panel at the World Economic Forum in January 2018 that "we were basically...
Claire Tills
Mar 27, 20184 min read
Watching a narrative change: Orbitz
One aspect of breach response and communication that's fascinated me has been the gravitational field incidents can have. Especially with...
Claire Tills
Feb 13, 20184 min read
Breach response expectations: cliches impeding change
There have been enough large-scale data breaches in the news that people now have expectations for how companies respond. There's a...
Claire Tills
Jan 30, 20184 min read
Shared Language: how to fake it if you don't have it
Speaking the same language as your audience is important. In most cases you're already speaking the literal, high-level language of your...
Claire Tills
Jan 16, 20184 min read
Audiences of infosec communication: Internal or external?
There are a lot of ways to think about audiences of information security messages. Your relationship to your audience influences how you...
bottom of page