Tailoring infosec communication: Five scenarios
Last post, I went over two methods for understanding or segmenting your audience. The first was based on the influence you have over your...
Last post, I went over two methods for understanding or segmenting your audience. The first was based on the influence you have over your...
I've mentioned a caveat in a few of my previous posts and talks that "it depends on your audience." Now I want to dive into that caveat a...
There are a few more things you might want to consider when you're using benefit framing for infosec. These are slightly more advanced...
Last time, I introduced the basics of gain-loss framing from health communication. I also discussed how this approach should be applied...
I've spoken before about the need for infosec communication and persuasion to move in a more positive and proactive direction. (This...
I realized that I've talked a lot about framing and never taken the time to actually discuss what I mean. Framing theory is used in a lot...
I don't want to hop on the meme-train here but the saga of Trevor gave me some ideas so here they are. Humor is rare in crisis...
Just in 2017, we've seen a lot of different types of infosec incidents gain major attention. With that attention, we've seen a variety of...
So, Equifax happened... this blog is not about that, even though it seems like it is. I wrote it before that news broke. Any resemblance...
In previous posts, I examined the use of communication at the more granular level of technical attribution, now I'd like to zoom out a...