KB
kbala.bsky.social
KB
@kbala.bsky.social
Enabling shift-left security practices! Member CTO-Club-NY
Cloudflare’s outage root cause is well explained here:
Prince (CEO) explained that a feature file doubled in size. The larger-than-expected feature file was then propagated to all the machines that make up our network.”
arstechnica.com/tech-policy/...
Massive Cloudflare outage was triggered by file that suddenly doubled in size
“I worry this is the big botnet flexing,” CEO said. But outage was self-inflicted.
arstechnica.com
November 20, 2025 at 10:28 AM
OWASP’s 2025 Wake-Up Call: Why Broken Access Control Still Haunts Web Security
November 18, 2025
OWASP’s 2025 findings show broken access control remains one of the most persistent and damaging web security problems.
kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
November 18, 2025 at 9:32 PM
The Security Vulnerabilities to Watch For When You’re Vibe Coding:
This article discusses common security vulnerabilities developers should be aware of when “vibe coding”—coding quickly without strict adherence to best practices. @harryguinness.bsky.social
kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
September 4, 2025 at 8:59 PM
Separating AI Hope from AI Hype:
If you believe the hype, AI will soon take all our jobs, or solve all our problems, or destroy all boundaries between reality and lies. This brilliant podcast by @randomwalker.bsky.social Arvind Narayanan will help sort that out.
kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
August 28, 2025 at 9:01 PM
Why Good Security Fails: The Asymmetry of InfoSec Investment

A paradox of security is that when you have invested appropriately and have less incidents, someone will ask: “Why are we spending on security when we don’t have any issues?"
@philvenables.bsky.social

kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
August 13, 2025 at 9:18 PM
The Art of Selling as an Engineer: What Does a Solutions Architect Do?
A great podcast to learn about what a “Solutions Architect” does and brings value! As always, a great podcast from Daliani Liu.
kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
August 10, 2025 at 1:52 AM
What are AI Foundational Models?
The current wave in AI is replacing task-specific models with those that are trained on a broad set of unlabeled data that can be used for different tasks, with minimal fine-tuning.

kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
August 2, 2025 at 11:47 PM
AI Tools Make development Slower for Senior Open-Source Developers: AI tools take 19% longer to complete tasks compared to those working without AI assistance. A lot of nuances to this very interesting study.
kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
July 26, 2025 at 10:13 PM
Input Validation Vulnerabilities Dominate MITRE’s 2024 CWE Top 25 List
kbala97.github.io/CyberTechHea...
Cyber Technology and Health
kbala97.github.io
July 20, 2025 at 1:37 PM
Reposted by KB
A year after the CrowdStrike incident spawned BSODs across the world, in July, Microsoft will roll out its Windows endpoint security platform to allow Windows solutions to run outside the kernel, hopefully eliminating the chance of such an incident again.
redmondmag.com/articles/202...
Microsoft Readies Multiple Security Updates in Name of Windows 'Resiliency' -- Redmondmag.com
Seven months after unveiling its Windows Resiliency Initiative (WRI), Microsoft on Thursday announced a raft of new and upcoming security capabilities.
redmondmag.com
June 27, 2025 at 10:35 AM
Finished reading a great book by Brook Shoenfield on "Threat Modeling" to secure systems early during the design phase and Shifting-Left on cybersecurity in the product lifecycle.
kbala97.github.io/CyberTechHea...
Securing Systems: Applied Security Architecture and Threat Models
An excellent introduction to security architecture and threat modeling, this book provides practical insights into designing secure systems. It covers essential concepts and methodologies that are cru...
kbala97.github.io
June 21, 2025 at 8:54 PM
Reposted by KB
How NAT works?
December 14, 2024 at 2:20 PM
Reposted by KB
#Cybersecurity attack vectors.
December 6, 2024 at 10:51 PM
Super creative!
How do I play OWAS Cornucopia without any knowledge of threat modeling or owasp?

You will find that it is surprisingly easy just watch this video by Grant Ongers.

m.youtube.com/watch?v=XXTP...

#cybersec #appsec #owasp #infosec #threatmodeling #cornucopia #gameification
How to play OWASP Cornucopia
YouTube video by OWASP Foundation
m.youtube.com
November 29, 2024 at 1:19 PM