Announcing the Unofficial Doing It Right Award This is how you do it right. Real stories of course correction, algorithmic integrity, and the people who still remember why they built these systems in the first place. It’s for those who still understand how to keep these systems accountable. Over the […]
Hunter Storm Presents | Femme Fatale to Federal Whistleblower | ISACA Central Ohio Chapter 2026
Femme Fatale to Federal Whistleblower | Insider Threat Lessons You Can’t Get Anywhere Else Status Update | January 8, 2026 Today’s ISACA session was cancelled due to a technical issue with the Zoom session. I appreciate the professionalism of the organizers and look forward to rescheduling the conversation. These discussions […]
Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off
Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off It’s Christmas Eve in the United States, and I’m saying, “Merry Christmas!” Everyone is free to call it whatever they like. That part isn’t the point. The point is something most people don’t see. […]
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP Abstract In fields built on trust, integrity, and protection, such as cybersecurity, research, and intelligence-adjacent work, the normalization of intellectual theft and plagiarism represents not a minor ethical lapse, but a systemic failure. This article explains […]
User-First Marketing Email Defaults | A Rare Example of Doing It Right
Finally, a Company Doing Email Defaults Right | A Case for Common Sense Privacy Preferences It’s been years since I’ve seen a company implement email preferences in a way that actually respects the user. And yes, I say this often: I’d love for just one company to “get it […]
The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering
The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering framework is the first predictive framework for human-layer threat modeling, built starting in 1994, fully matured by 2000, and presented publicly in […]
The Ultimate “Everything-Tech” Serenity Prayer
Calm in The Storm A modern Serenity Prayer for experts whose insights across artificial intelligence (AI), cybersecurity, quantum computing, technology, and emerging technologies are ignored or dismissed—capturing the patience, humor, and quiet satisfaction of knowing the truth before the world catches up. The Ultimate “Everything-Tech” Serenity Prayer Grant me […]




