Is Your AI Philosophy Broken?

AI-Generated Code: Productivity Gains, Security Pains, and the Real Cost of Vulnerabilities Key Takeaway: While AI coding tools promise impressive productivity gains, the data shows they also dramatically increase both the number and cost of software vulnerabilities. Without robust human oversight, your security backlog, and your remediation budget, could spiral…

Continue reading

AI Vulnerability Factory

Recently Published

Threat Modeling Remotely with Miro and EoP

Threat modeling with teams is a process that requires visuals, interaction between team members and discussion and so lends itself to everyone being in a room together. This has been quite hard the last two years. It also doesn’t look to be getting any easier, so we should probably get used to it. Here’s how I’ve been doing it with several teams.

Application Security is More than Just Pen Testing

So often organizations believe that Application Security stops at penetration testing and fixing vulnerabilities but it is more than that, penetration testing is the reactive side of things but you also need the proactive aspects of Application Security to reduce the flow.

CAPEC-STRIDE Mapping

Mapping between the Common Attack Pattern Enumeration and Classification (CAPEC) from Mitre and the S.T.R.I.D.E. Categories used in Threat Modeling.

Python3 Notes

This is just a collection of notes I’ve made over a period of time to remind me of certain commands or syntax. I will continue adding to this over time. I’m also going to add my Natural Language Processing notes and Machine Learning Notes in a couple of other articles.

Introduction to SAML for Managers

SAML allows your users to be authenticated and authorized without direct interaction with your web site. It does this by creating a trust relationship between the site and a trusted third party who vouches for the identity of the user. This article explains both how this happens and what the additional benefits are.

Browse all Topics