'Not in my threat model'?
You know what's not in my threat model? A meteor hitting a volcano... And that's ok!
You know what's not in my threat model? A meteor hitting a volcano... And that's ok!
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
A new article by Steve Bellovin and myself at Lawfare.
The Supreme Court has ruled in the van Buren case, and there's a good summary on the Eff's blog.
People sometimes ask me about my recording setup, and I wanted to share some thoughts about recording good learning content.
Adam Shostack's review of the book Practical Cybersecurity Architecture
Threat model Thursday is not just back, but live again!
The National Science Foundation is looking for information on needs for datasets.
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
AppSec Pacific Northwest Conference is a free application security conference that will be held Saturday, June 19th. It is a virtual, online event sponsored by the OWASP chapters of Portland, Vancouver, and Victoria.
So there's some good news and some bad news in this story: 'Too Bad, Zuck: Just 4% of U.S. iPhone Users Let Apps Track Them After iOS Update'.
Apple has released ‘Device and Data Access when Personal Safety is At Risk’ and I wanted to explore it a bit.
“It depends on your threat model...”
Just stop.
If everyone agrees on what we should do, why do we seem incapable of doing it?