top of page
Search
Claire Tills
Dec 13, 20175 min read
Tailoring infosec communication: Five scenarios
Last post, I went over two methods for understanding or segmenting your audience. The first was based on the influence you have over your...
Claire Tills
Dec 1, 20174 min read
Audiences of infosec communication
I've mentioned a caveat in a few of my previous posts and talks that "it depends on your audience." Now I want to dive into that caveat a...
Claire Tills
Nov 13, 20175 min read
Other considerations for benefit-framing
There are a few more things you might want to consider when you're using benefit framing for infosec. These are slightly more advanced...
Claire Tills
Nov 6, 20176 min read
How to use benefit frames for infosec
Last time, I introduced the basics of gain-loss framing from health communication. I also discussed how this approach should be applied...
Claire Tills
Oct 26, 20174 min read
Positive and Proactive: Benefit frames for infosec persuasion
I've spoken before about the need for infosec communication and persuasion to move in a more positive and proactive direction. (This...
Claire Tills
Oct 23, 20172 min read
Framing: A primer
I realized that I've talked a lot about framing and never taken the time to actually discuss what I mean. Framing theory is used in a lot...
Claire Tills
Oct 4, 20175 min read
Humor and Rumor in Crisis Communication #TrevorForget
I don't want to hop on the meme-train here but the saga of Trevor gave me some ideas so here they are. Humor is rare in crisis...
Claire Tills
Sep 20, 20176 min read
Thinking about data after a breach: Fear, outrage, or apathy?
Just in 2017, we've seen a lot of different types of infosec incidents gain major attention. With that attention, we've seen a variety of...
Claire Tills
Sep 13, 20176 min read
Crisis Communication and Incident Response pt. 2
So, Equifax happened... this blog is not about that, even though it seems like it is. I wrote it before that news broke. Any resemblance...
Claire Tills
Sep 6, 20176 min read
Crisis Communication and Incident Response pt. 1
In previous posts, I examined the use of communication at the more granular level of technical attribution, now I'd like to zoom out a...
bottom of page