Helped to create the CVE and many other things. Fixed autorun for XP. On Blackhat Review board.
Books […]
[bridged from https://infosec.exchange/@adamshostack on the fediverse by https://fed.brid.gy/ ]
Phil Venables, CSO for Goldman Sachs and then Google cloud has kicked off a series, Security Leadership Master Class. Even if you’re not a CISO, understanding the leadership principles he lays out is helpful to you.
(1/5)
Phil Venables, CSO for Goldman Sachs and then Google cloud has kicked off a series, Security Leadership Master Class. Even if you’re not a CISO, understanding the leadership principles he lays out is helpful to you.
(1/5)
https://shostack.org/blog/stop-trying-to-manage-risk/
https://shostack.org/blog/stop-trying-to-manage-risk/
People hope risk management will solve all their cyber […]
[Original post on infosec.exchange]
People hope risk management will solve all their cyber […]
[Original post on infosec.exchange]
While in Boston, I had the chance to see “The Moonwalkers: A Journey with Tom Hanks,” and highly recommend it, not because I was wowed (I was) but because […]
[Original post on infosec.exchange]
While in Boston, I had the chance to see “The Moonwalkers: A Journey with Tom Hanks,” and highly recommend it, not because I was wowed (I was) but because […]
[Original post on infosec.exchange]
This morning, two strands of work intersected. The first is the upcoming launch of our Threat Modeling Intensive with AI. I’m excited about this course as it brings together all these essential skills […]
[Original post on infosec.exchange]
This morning, two strands of work intersected. The first is the upcoming launch of our Threat Modeling Intensive with AI. I’m excited about this course as it brings together all these essential skills […]
[Original post on infosec.exchange]
There’s press about AI insurance, and I don’t want to critique any specific firm, I’d like to offer a prediction: No customer will ever see a payout. We can see the dynamic that’s emerged in cybersecurity and learn from it.
(1/6)
There’s press about AI insurance, and I don’t want to critique any specific firm, I’d like to offer a prediction: No customer will ever see a payout. We can see the dynamic that’s emerged in cybersecurity and learn from it.
(1/6)
Threat Modeling
The Secret Service announced they’d busted a SIM farm “used for swatting” and set off a bit of a firestorm. CNN has one of the more detailed stories. 404Media […]
[Original post on infosec.exchange]
Threat Modeling
The Secret Service announced they’d busted a SIM farm “used for swatting” and set off a bit of a firestorm. CNN has one of the more detailed stories. 404Media […]
[Original post on infosec.exchange]
Don't let complexity prevent you from starting. Begin with these questions and improve iteratively.
Full discussion […]
[Original post on infosec.exchange]
Don't let complexity prevent you from starting. Begin with these questions and improve iteratively.
Full discussion […]
[Original post on infosec.exchange]
Modern attacker, “nah this works fine”
Modern attacker, “nah this works fine”
While I'm talking about the Lunar Rover, I want to tell a tale of two models. One you've met: the Lego model. The other is a model, currently on display at the Museum […]
[Original post on infosec.exchange]
While I'm talking about the Lunar Rover, I want to tell a tale of two models. One you've met: the Lego model. The other is a model, currently on display at the Museum […]
[Original post on infosec.exchange]
I was thrilled to find this photo at a thrift store. There’s a typewritten letter on the back from Earl Houtz, LRV program manager, which is .. not exceptionally personal, leading me to think this could have […]
[Original post on infosec.exchange]
I was thrilled to find this photo at a thrift store. There’s a typewritten letter on the back from Earl Houtz, LRV program manager, which is .. not exceptionally personal, leading me to think this could have […]
[Original post on infosec.exchange]
Is threat modeling a journey or a destination? Is it a noun or a verb? This nuance pervades our conversations. The model of lightweight approaches with a whiteboard that found important […]
[Original post on infosec.exchange]
Is threat modeling a journey or a destination? Is it a noun or a verb? This nuance pervades our conversations. The model of lightweight approaches with a whiteboard that found important […]
[Original post on infosec.exchange]
Not doing the full post here, its a lot of work...
Not doing the full post here, its a lot of work...
This is the second part of a short series. The first post looks at threat modeling tooling more broadly; this one is focused on LLMs in threat modeling.
It seems like you can’t turn around without […]
[Original post on infosec.exchange]
This is the second part of a short series. The first post looks at threat modeling tooling more broadly; this one is focused on LLMs in threat modeling.
It seems like you can’t turn around without […]
[Original post on infosec.exchange]