PROTECT

WHAT YOU'RE PROTECTING — AND HOW
ONLY SELECT POWER USER, DEVELOPER, OR IT PROFESSIONAL IF THAT DESCRIBES YOU
SELECT ONE OR MORE CATEGORIES TO NARROW RESULTS
SELECT TAGS TO FILTER BY TOPIC — ARTICLES MUST MATCH ALL SELECTED
02-20-2026 POWER SECURITY OPERATIONS D7 — Security Operations
Your Incident Response Plan
The worst time to write an incident response plan is during an incident. Build the playbook now, before everything is on fire.
10 MIN READ
02-17-2026 EVERYONE DEVICES
Android Privacy
Your Android phone was built by Google, designed to report back — these settings reduce what it sends home, though they don't eliminate it.
8 MIN READ
02-15-2026 EVERYONE DEVICES
iOS Privacy
Apple charges a premium to tell you privacy matters — they also paid $95 million because Siri was recording private conversations and sharing snippets with advertisers.
8 MIN READ
02-13-2026 EVERYONE GENERAL BEST PRACTICES
Phishing & Scams
Phishing doesn't look like phishing anymore — the Nigerian Princes of 2005 have been replaced by AI-generated CFOs on video calls authorizing $25 million wire transfers.
5 MIN READ
02-11-2026 POWER RISK MANAGEMENT D1 — Security & Risk Mgmt
Your Organization's Risk Posture
You can't protect what you don't know you have. A risk assessment is the first step — here's how to actually do one.
8 MIN READ
02-08-2026 EVERYONE
Protect: Your Passwords
If it's easy for you to remember, it's easy for them too.
2 MIN READ
02-06-2026 POWER SECURITY OPERATIONS D7 — Security Operations
Your Log Pipeline
If you can't see it, you can't detect it. Here's how to build a log pipeline that catches breaches instead of burying you in noise.
10 MIN READ
02-04-2026 EVERYONE SOCIAL NETWORKING SERVICES
Zoom
Zoom's encryption has been questioned by security researchers multiple times — here's how to run tighter meetings regardless.
4 MIN READ
02-02-2026 EVERYONE GENERAL BEST PRACTICES
Delete Browser Artifacts
Your browser remembers everywhere you've been — so does anyone who picks up your device after you, and here's how to clean the trail.
4 MIN READ
01-31-2026 POWER SECURITY ARCHITECTURE D3 — Security Architecture
Your Certificates & TLS
Expired certificates take down services. Misconfigured ones expose data. Here's how to manage the certificate lifecycle without losing sleep.
9 MIN READ
01-28-2026 POWER IDENTITY & ACCESS MANAGEMENT D5 — Identity & Access Mgmt
Your SSO Implementation
Your SSO is the single point of trust for every connected service. Here's how to harden it — because if the IdP falls, everything falls.
7 MIN READ
01-26-2026 POWER IDENTITY & ACCESS MANAGEMENT D5 — Identity & Access Mgmt
Your Admin Accounts
Admin accounts are the keys to the kingdom. Here's how to lock them down — credential vaulting, JIT access, session monitoring, and the break-glass procedures you need before you need them.
9 MIN READ
01-24-2026 POWER SECURITY ARCHITECTURE D3 — Security Architecture
Your Network with Zero Trust
The perimeter is dead. Zero Trust means verify everything, trust nothing, and assume breach. Here's how to actually implement it.
8 MIN READ
01-22-2026 POWER SECURITY ASSESSMENT D6 — Security Assessment
Your Vulnerability Pipeline
CVSS scores lie to you. Prioritize by exploitability, not severity numbers. Here's how to build a vulnerability management program that actually reduces risk.
8 MIN READ
01-19-2026 POWER SOFTWARE DEVELOPMENT SECURITY D8 — Software Dev Security
Your Development Pipeline
Your pipeline has deployment credentials, code signing keys, and production access. Here's how to lock it down before someone else finds out.
8 MIN READ
01-17-2026 POWER NETWORK SECURITY D4 — Network Security
Your Network Architecture
A flat network is a playground for attackers. Segment by trust zone, firewall between segments, and monitor east-west traffic.
9 MIN READ
01-15-2026 POWER SOFTWARE DEVELOPMENT SECURITY D8 — Software Dev Security
Your Dependencies
You didn't write 80% of your code. Here's how to make sure the 80% you're trusting isn't compromised, vulnerable, or abandoned.
8 MIN READ
01-13-2026 POWER SOFTWARE DEVELOPMENT SECURITY D8 — Software Dev Security
Your APIs
Your API is your biggest attack surface. Here's the hardening checklist — authentication, rate limits, input validation, and the logging that catches abuse before it becomes a breach.
9 MIN READ
01-11-2026 EVERYONE GENERAL BEST PRACTICES
Additional Resources
A curated list of tools, services, and organizations for the folks who want to go further — bookmark this page and come back to it.
4 MIN READ
01-08-2026 POWER SECURITY ARCHITECTURE D3 — Security Architecture
Your Cloud Infrastructure
The defaults are not secure. Here's the cloud hardening checklist that would have prevented most of the breaches you've read about.
7 MIN READ
01-06-2026 POWER RISK MANAGEMENT D1 — Security & Risk Mgmt
Your Compliance Obligations
Compliance isn't optional, but it doesn't have to be a nightmare. Here's what you actually need to do for each framework.
10 MIN READ
01-04-2026 POWER ASSET SECURITY D2 — Asset Security
Your Deleted Data
Dragging to the recycle bin isn't deleting. Here's how to actually destroy data so it stays dead.
9 MIN READ
01-02-2026 POWER SECURITY ARCHITECTURE D3 — Security Architecture
Your Data with Encryption
Encryption at rest, in transit, and in use. Here's what to turn on, what tools to use, and what 'encrypted' actually means.
7 MIN READ
12-30-2025 POWER SECURITY OPERATIONS D7 — Security Operations
Your Backup & Recovery Strategy
Backups that haven't been tested are just hopes stored on disk. Here's how to build a recovery strategy that actually works when you need it.
11 MIN READ
12-28-2025 POWER ASSET SECURITY D2 — Asset Security
Your Organization's Data
You can't protect what you haven't classified. Here's how to build a classification scheme that people actually follow.
7 MIN READ
12-26-2025 EVERYONE GENERAL BEST PRACTICES
Data Broker & People Search Opt-Out
Your personal information is currently for sale on dozens of websites — these opt-outs are tedious by design, but each removal reduces your exposure.
5 MIN READ
12-24-2025 EVERYONE DIGITAL ECOSYSTEMS
Temu
Security researchers and a 2023 class action lawsuit describe the Temu app as functioning like spyware — the safest move is not installing it at all.
3 MIN READ
12-22-2025 EVERYONE DEVICES
Traveling with Smartphones
Your phone is your most exposed device when you travel — border agents have authority, public WiFi is compromised, and the habits that protect you at home become critical on the road.
4 MIN READ
12-19-2025 EVERYONE GENERAL BEST PRACTICES
Child Safety Online
Children are among the most at-risk groups online — open communication is the first line of defense, but the technical controls here back it up.
3 MIN READ
12-17-2025 EVERYONE DIGITAL ECOSYSTEMS
Hidden Apps
Some apps on your device aren't what they say they are — they look like calculators and function as vaults, and here's how to find them.
4 MIN READ
12-15-2025 EVERYONE GENERAL BEST PRACTICES
EXIF Removal
Every photo you take is carrying a passenger — GPS coordinates, timestamps, and device identifiers riding along invisibly until someone extracts them.
4 MIN READ
12-13-2025 EVERYONE DEVICES
Fitness Apps
Your workout is a surveillance log — fitness apps track your physical location in real time including your home, workplace, and daily routes.
4 MIN READ
12-10-2025 EVERYONE GENERAL BEST PRACTICES
Photo Sharing Sites
Photos contain more than what's visible — GPS coordinates, timestamps, and device info are baked into the file and shareable with everyone who sees the image.
5 MIN READ
12-08-2025 EVERYONE GENERAL BEST PRACTICES
Self Assessment
Before you lock anything down, you need to know what's already out there — and this is how you find out.
4 MIN READ
12-06-2025 EVERYONE GENERAL BEST PRACTICES
Online Registration
Every field you fill out is a data point — most of those fields aren't actually required, they just feel that way.
5 MIN READ
12-04-2025 EVERYONE DIGITAL ECOSYSTEMS
Pay Apps
These apps move real money, and unlike a credit card there's no dispute process for a Zelle transfer — once it's gone, it's gone.
4 MIN READ
12-02-2025 EVERYONE SOCIAL NETWORKING SERVICES
Dating Sites & Apps
Dating apps collect your face, location, and intimate preferences by design — here's how to use them without handing over your entire identity.
4 MIN READ
11-29-2025 EVERYONE GENERAL BEST PRACTICES
Identity Theft — Prevention & Recovery
Your identity is a target — this page covers how to make yourself harder to hit, and what to do immediately if someone already has.
7 MIN READ
11-27-2025 EVERYONE GENERAL BEST PRACTICES
WiFi Security
Your router's default admin password is probably on Google — default credentials are public knowledge, and the usual suspects know them too.
5 MIN READ
11-25-2025 EVERYONE GENERAL BEST PRACTICES
Anti-Virus
Your OS already has antivirus built in — most people have never opened it, and the ransomware protection setting is one most people have never enabled.
8 MIN READ
11-23-2025 EVERYONE GENERAL BEST PRACTICES
Lock Down Your Laptop & VPN
A VPN encrypts your connection and doesn't make you invisible — but it makes you a lot less easy, and that's worth something.
9 MIN READ
11-20-2025 POWER IDENTITY & ACCESS MANAGEMENT D5 — Identity & Access Mgmt
Your Authentication Stack
MFA is the single most effective control you can deploy. Here's how to do it right — from choosing factors to auditing the accounts that don't have it yet.
9 MIN READ
11-18-2025 EVERYONE GENERAL BEST PRACTICES
Password Managers
You have more accounts than you can count and probably one reused password holding most of them together — here's why that's the domino and how to fix it.
10 MIN READ
11-16-2025 EVERYONE DEVICES
Oura Ring
Your sleep data, heart rate, and body temperature are being stored on a server you don't control — here's how to understand the scope of it and minimize what leaves your device.
3 MIN READ
11-14-2025 EVERYONE DEVICES
Nintendo Switch
The Switch has more social exposure than most parents realize, and the best parental controls live in a separate app that most people never download.
3 MIN READ
11-12-2025 EVERYONE DEVICES
Xbox
Xbox is linked to your Microsoft account — these settings protect your identity and data across both.
4 MIN READ
11-09-2025 EVERYONE DEVICES
PlayStation
Your PSN account holds your game library, your credit card, and years of activity data — treat it like a financial account, because in a breach, that's exactly what it is.
3 MIN READ
11-07-2025 EVERYONE DIGITAL ECOSYSTEMS
Coinbase
Coinbase holds real money — not points, not followers — and unlike a bank, there's no FDIC insurance on your crypto if an account is compromised.
2 MIN READ
11-05-2025 EVERYONE DIGITAL ECOSYSTEMS
Amazon
Amazon knows what you buy, when you sleep, what you eat, and whether you're home — and most of the settings that limit that are buried.
5 MIN READ
11-03-2025 EVERYONE DIGITAL ECOSYSTEMS
Google
Google already knows your search history, location, email, calendar, and what you watch at 2am — these settings won't undo that, but they'll slow the machine down.
4 MIN READ
10-31-2025 EVERYONE SOCIAL NETWORKING SERVICES
Twitch
Live streaming is permanent — anything you do on stream can be clipped, screenshotted, and redistributed, and that goes for chat too.
2 MIN READ
10-29-2025 EVERYONE SOCIAL NETWORKING SERVICES
Signal
Signal is actually good — this page isn't here to warn you off it, just to make sure you've turned on the settings that matter.
3 MIN READ
10-27-2025 EVERYONE SOCIAL NETWORKING SERVICES
Telegram
Telegram is not encrypted by default — most people who use it think it is, and that gap between the marketing and the reality is significant.
2 MIN READ
10-25-2025 EVERYONE SOCIAL NETWORKING SERVICES
WhatsApp
WhatsApp encrypts message content, but Meta owns WhatsApp — who you talk to, when, how often, and from where is still collected.
3 MIN READ
10-23-2025 EVERYONE DIGITAL ECOSYSTEMS
YouTube
Your watch history is a detailed map of your interests, your anxieties, and your late nights — Google owns that map and uses it.
3 MIN READ
10-20-2025 EVERYONE SOCIAL NETWORKING SERVICES
Pinterest
Every board you build is a public interest map — your wishlist is a profile, and Pinterest defaults to showing all of it to everyone, including the data harvesters.
3 MIN READ
10-18-2025 EVERYONE SOCIAL NETWORKING SERVICES
LinkedIn
Your professional profile is a data harvester's dream — employer, job history, location, education, and daily activity, all public by default.
4 MIN READ
10-16-2025 EVERYONE SOCIAL NETWORKING SERVICES
Reddit
Every post you've ever made on Reddit is indexed, searchable, and permanent — even after you delete your account, the archive remembers.
3 MIN READ
10-14-2025 EVERYONE SOCIAL NETWORKING SERVICES
Discord
Discord is where the internet lives — which means the usual suspects are there too, right alongside every setting you've never touched.
4 MIN READ
10-11-2025 EVERYONE SOCIAL NETWORKING SERVICES
Snapchat
Nothing on Snapchat truly disappears — screenshots exist, screen recording exists, and Snapchat stores all of it anyway.
4 MIN READ
10-09-2025 EVERYONE SOCIAL NETWORKING SERVICES
TikTok
TikTok is owned by ByteDance, which operates under Chinese law — your data is subject to Chinese government access, and that's not a theory.
3 MIN READ
10-07-2025 EVERYONE SOCIAL NETWORKING SERVICES
X (Twitter)
Every hashtag you use is a public index of your opinions, your follows list maps your interests, and X's defaults share all of it.
4 MIN READ
10-05-2025 EVERYONE SOCIAL NETWORKING SERVICES
Instagram
Instagram is a Meta product feeding the same machine as Facebook — your photo habits, location, and daily routine are all part of the data stream.
5 MIN READ
10-03-2025 EVERYONE SOCIAL NETWORKING SERVICES
Facebook
Meta has built a more detailed file on you than most governments have — here's how to close some of the doors they left wide open.
5 MIN READ