So You Got Hacked: Whose Fault Is It?
Exploring accountability and responsibility when security breaches occur. Who's really at fault when systems are compromised?
Blog
Thoughts on application security, threat modeling, and building secure systems at scale.
Exploring accountability and responsibility when security breaches occur. Who's really at fault when systems are compromised?
As a security consultant who has audited container environments at dozens of companies, learn battle-tested, security-first ways to optimize your Docker images, so you ship lean, fast, and hardened by default.
In today's fast-paced development world, security engineers face constant pressure to keep up with rapid releases. Learn how threat modeling can help you stay ahead of threats.
This article explains the STRIDE framework and then walks through a simple school web application complete with an architecture diagram and a step-by-step threat model designed for teaching purposes.
Thinking about jumping into cybersecurity? Good choice! With cyber threats on the rise, cybersecurity jobs are hot right nowb and the pay is good.
In the world of software development, APIs play a vital role in enabling different applications to communicate and interact with each other seamlessly. Learn the basics with simple examples.
A curated list of essential resources for frontend developers including icons, photos, videos, audio, vectors, and design inspiration tools to speed up your development workflow.
Learn the proven framework to transform your bad habits into good ones. Discover why habits define your future and how to successfully change them with practical steps that work.
Follow me on Medium for the latest insights on application security, threat modeling, and secure development practices.
Follow on Medium