A declaration of standards in an era of broken ones. The Unofficial Doing It Right Award spotlights the rare people and organizations who correct course, uphold integrity, and keep systems accountable even when no one is watching. This series distills complexity into clarity, exposes the mechanics beneath the narrative, and honors those who still inspect the pipes where trust leaks. It’s a blueprint, a challenge, and a reminder that doing it right isn’t about prestige — it’s about responsibility, transparency, and building systems worthy of the people they serve.
Hunter Storm Presents | Femme Fatale to Federal Whistleblower | ISACA Central Ohio Chapter 2026
Femme Fatale to Federal Whistleblower | Insider Threat Lessons You Can’t Get Anywhere Else Status Update | January 8, 2026 Today’s ISACA session was cancelled due to a technical issue with the Zoom session. I appreciate the professionalism of the organizers and look forward to rescheduling the conversation. These discussions […]
Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off
Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off Originally published December 24, 2025 It’s Christmas Eve in the United States, and I’m saying, “Merry Christmas!” Everyone is free to call it whatever they like. That part isn’t the point. The point […]
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP Abstract In fields built on trust, integrity, and protection, such as cybersecurity, research, and intelligence-adjacent work, the normalization of intellectual theft and plagiarism represents not a minor ethical lapse, but a systemic failure. This article explains why […]
User-First Marketing Email Defaults | A Rare Example of Doing It Right
Finally, a Company Doing Email Defaults Right | A Case for Common Sense Privacy Preferences It’s been years since I’ve seen a company implement email preferences in a way that actually respects the user. And yes, I say this often: I’d love for just one company to “get it […]
The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering
The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering framework is the first predictive framework for human-layer threat modeling, built starting in 1994, fully matured by 2000, and presented publicly in 2007, […]
The Ultimate “Everything-Tech” Serenity Prayer
Calm in The Storm A modern Serenity Prayer for experts whose insights across artificial intelligence (AI), cybersecurity, quantum computing, technology, and emerging technologies are ignored or dismissed—capturing the patience, humor, and quiet satisfaction of knowing the truth before the world catches up. The Ultimate “Everything-Tech” Serenity Prayer Grant me […]




