
Elevation of Privilege In The Time of Cholera
How to play in person games while maintaining safe distances.
How to play in person games while maintaining safe distances.
These are the books that I read in Q2 2020 that I think are worth your time.
Informal training may work in some cases, but Threat Modeling skills should be passed on through more formal means.
I have something to disclose...
I'll be speaking at the MDIC's Annual Public Forum today, discussing how threat modeling helps bring maturity to the medtech sector.
A talk from the Biohacking Village at DefCon brought up a good point.
A few tips on getting the most out of attending a virtual security conference.
A recent post from Helen L. of the UK’s NCSC, A sociotechnical approach to cyber security, shares the context of socio-technical approaches.
Not usually one for the video format, I'm expanding my horizons thanks to 2020 being what it is.
I enjoyed being a guest on Software Engineering Radio in this in depth interview.
I recently signed onto the amicus brief on the Van Buren/Computer Fraud and Abuse Act filed by the Electronic Frontier Foundation.
The Internet Society Open Letter Against Lawful Access to Encrypted Data Act was published this morning.
A recent talk by Alyssa Miller focuses on integrating threat modeling in devops.
My thoughts on an interesting blog post discussing how to bring threat modeling into the Scaled Agile Framework.
I'm excited to see that they're Re-introducing the Cyentia Research Library, with cool (new?) features like an RSS feed. There are over 1,000 corporate research reports with data that companies paid to collect, massage, and release in a way they felt would be helpful to the rest of the world.