The Unexpected Benefits of Threat Modeling
Threat modeling is a disciplined approach to technology design that identifies security threats and design constraints to prevent security flaws before they manifest in your platform.
Vulnerability Research and the Importance of Supporting Young Talent
This is a story with a happy ending where we were able to get back to the collaboration from the early open disclosure days, utilize modern practices to ensure responsible handling of the information, and allow a young person to make a positive contribution to infosec.
When You Have No Bars
A major network update failure led to a massive cellphone service outage across the US, impacting thousands and disrupting essential services. Despite cellular networks’ redundancy, the incident highlighted vulnerabilities in communication infrastructure when multiple base stations fail simultaneously.
The Balancing Act: Online Security vs. Privacy
Data is both currency and vulnerability, which leads to a conflict between privacy and security. This intersection reveals a harsh reality—enhancing cybersecurity to prevent or fight off threats
Our Most Common Pen Test Finding? Vulnerabilities in Third-Party Components
Would You Like To Play A Game? Increasing Security and Compliance Through Gamification of Tabletop Exercises
Tabletop exercises have been used for years to mimic incident response and disaster recovery situations. They are designed to test people or processes to allow teams to practice getting out of trouble before the trouble happens.