Category: Resilience
You are viewing all posts from this category, beginning with the most recent.
Iβve been staying with my Mom while she recovers from surgery, and sheβs been watching the news. It is 99% propaganda, vapid, or irrelevant. Makes me want to go into news.
π Still true! If you are doing something in journalism and need cybersecurity help, please let me know!
ποΈπ Tomorrow Iβm recording for the eXecutive Security Podcast.
My bar for podcasts:
βIs this a better use of my time than an audiobook?β
So I take this pretty seriously. Hopefully weβll make it worth your listening time.
π The 2024 edition of CWE Top 25 is published:
Most Dangerous Software Weaknesses
“But what about the OWASP Top 10?” Think of the OWASP list as more of an engagement and learning tool.
The CWE 25 can more effectively be used as a target list to build your evaluation, mitigation, and prevention.
π Big improvements to calls in Signal: call links
ππ₯ Hey, you know how security teams are the worst and nobody wants to work with them?
Anyway, this is a signed going away present from the engineering platform and architecture leaders.
Definitely a keeper, even after itβs empty.

π Iβm at the CSO Conferencece and Awards.
Tomorrow, my team will be accepting a CSO50 award for our security automation platform that supports 4000 engineers and 7000 applications.
Iβve since left the company, but am here supporting my previous team. Proud of them!
π Banks: practice internet safety!
Also banks: we won’t let you login if you are blocking junk in your browser or using a VPN
π The opportunity: application threat modeling & secure design review is one of the highest value appsec/prodsec activities, but is hard to implement efficiently and at scale.
A bad solution: provide a long list of controls that need to be checked each time
A better solution: generate relevant security requirements automatically based on whatβs being built
Met with primesec yesterday, and this is what they are trying to do! They are using LLM to read whatβs in your user stories (etc.), summarizing the work for the security team, and injecting specific security control requirements.
If this catches even a small portion of the real requirements, it would be a major uplift for teams both from a security and efficiency perspective. Looking forward to checking it out.
π Met with the folks from Pangea yesterday.
Looks like it could be an interesting solution for:
- small developer orgs that don’t have time or expertise to deal with common security needs
- large developer orgs that need consistency, scale, and governance of their security capabilities