Mark Nunnikhoven, Hacker Noon

Mark Nunnikhoven

Hacker Noon

United States

Contact Mark

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Hacker Noon
  • Trend Micro
  • Medium

Past articles by Mark:

setTimeout vs setImmediate vs process.nextTick –

What’s the difference between setTimeout(callback, 0) and process.nextTick(callback)? How about Node's setImmediate(callback)? → Read More

Four years after my coding bootcamp –

In 2012, I moved back to the US after spending most my adult life in Taiwan and then Beijing. It was a brutal adjustment. → Read More

Uber: How Not To Handle A Breach

Uber continues to be its own worst enemy as it comes to light they failed to disclose a breach in Oct/2016 that affected 57 million people. → Read More

Get Certified At AWS re:Invent 2017 –

Take advantage of the energy at the show and come home with a new cloud credential proving what you know! → Read More

Here's Why You Should Consider A Career In Cybersecurity

Zero percent unemployment is an attractive stat. It’s a nice perk but doesn’t compare to the more compelling reasons to pursue a career in cybersecurity. → Read More

Here's Why You Should Consider A Career In Cybersecurity

Zero percent unemployment is an attractive stat. It’s a nice perk but doesn’t compare to the more compelling reasons to pursue a career in cybersecurity. → Read More

Equifax Breach – an Example of Good Communications

Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44 percent of the US population. This breach will have a significant impact on a lot of people. Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today’s threat landscape. Security... → Read More

4 Principles For Hybrid Cloud Success

The future is cloud. Organizations are asking “how much?” and “how fast?”. These 4 principles will set you on the path for success. → Read More

Amazon Macie and Deep Security

Amazon S3 stores trillions of objects and regularly peaks at millions of requests per second. By any metric, it’s massive. With unparalleled durability and availability, it’s the backbone of AWS’ data services. This morning at the AWS Summit in New York City, AWS launched a new service: Amazon Macie. Trend Micro is proud to support... → Read More

Promoting Online Safety in Canada: Trend Micro Launches Video Contest for Local Kids

At Trend Micro we always strive to be a responsible corporate citizen. Right from the beginning the company has devoted significant time and resources to a variety of projects: from house building in the Philippines, to our Give and Match programs around the world designed to support vital community projects. However, a special focus has... → Read More

Promoting Online Safety in Canada: Trend Micro Launches Video Contest for Local Kids

At Trend Micro we always strive to be a responsible corporate citizen. Right from the beginning the company has devoted significant time and resources to a variety of projects: from house building in the Philippines, to our Give and Match programs around the world designed to support vital community projects. However, a special focus has... → Read More

WannaCry & The Reality Of Patching

The WannaCry ransomware campaign is impacting systems worldwide. The patches are available so why has this campaign been successful? → Read More

Is Your Security Team Setup To Fail?

Security teams everywhere have the same structure and are viewed as having one job, "stop hackers". Is that the best way to protect your organization? → Read More

OAuth Phishing On The Rise

Recently there was a significant volume of new phishing emails aimed at capturing access to Google accounts…specifically your email and contacts. You can read more about it at The Verge, Quartz, and Ars Technica. This phish is a great—evil !?!—example of a sophisticated attempt to gain access to a large number of users accounts. In... → Read More

Pragmatic Hybrid Cloud Security

You have assets running in the cloud and on-premises. Failing to plan for it and not adjusting your workflows is a mistake. Here's how to tackle the issue. → Read More

The S In HTTPS

Surfing the web securely is hard enough, US-CERT warns not to make it harder by calling out common errors in SSL/TLS interception technology. → Read More

Hackers Attempt To Extort Apple

Cybercrime is a business. The latest attack on Apple doesn't make good business sense. What's going on and how can you protect yourself? → Read More

3 Steps To Take For Social Media Account Security

Social media is the new voice of your organization, it’s has to represent your brand. Here are the 3 critical steps to secure your social media presence. → Read More

Starting Fresh in AWS – marknca –

Getting started in AWS used to be simple. There was a single service for compute, storage, and a few others services in early trials. Fast forward 10+ years and AWS now offers over 50 services… → Read More