3 Arguments for Threat Modeling
Top 3, from Continuum
Top 3, from Continuum
A resource for those developing games.
Recent article in Bentham’s Gaze
Secrecy isn't the best policy when it comes to public health.
Congratulations to the Hayabusa2 mission team, who flew to an asteroid, dropped multiple rovers, an impactor and a separate camera satellite to observe the impactor. The Hayabusa2 then flew around, to the far side of the asteroid to avoid ejecta from the impactor. In a few weeks, Hayabusa2 will probably land, collect more samples and then fly back to Earth.
Just what the title says...
Over-inflated numbers won't scare me into buying your ‘solution’.
Has it been that long already?
Some points to consider, from Andrew Odlyzko.
RSA has posted a video of my talk, “Threat Modeling in 2019”.
I've signed on to Access Now's letter to the Indian Ministry of Electronics and Information Technology, asking the Government of India to withdraw the draft amendments proposed to the Information Technology (Intermediary Guidelines) Rules.
There's only a few times to use a pie chart, but to help you celebrate, there's how to keep track of your intake:
My talks from AppSecCali 2019
[no description provided]
Some tips on how to regoup and catch up after being away for conferences.