A quote on Critical ThinkingDuring a recent trip to Paris, I noticed a quote written in french that caught my attention on the first day I arrived. It was displayed in…Dec 28, 2022Dec 28, 2022
Thoughts on creating a Cyber Threat Intelligence Program from scratchDisclaimerMay 21, 20221May 21, 20221
And then, You just need to go outI started my ex-pat life in Ireland a few months ago. It was my first trip since the COVID 19 outbreak; the last country I visited was…Apr 9, 2022Apr 9, 2022
Threat Modeling simple questionsI’m a big fan of Threat Modeling. In his training material, Adam Shostack has done a great job simplifying this topic by defining and…Mar 13, 2022Mar 13, 2022
Open Redirects: Low vulnerability with potential severe impactThe Open Web Application Security Project, or OWASP for short, included in the OWASP Top 10 2013 the Unvalidated Redirects and Forwards.Mar 11, 2022Mar 11, 2022
Thoughts on bad writingAs a non-native English speaker, I’ve been surrounded by fears, founded- and sometimes unfounded fears when writing. You may argue why then…Oct 25, 2021Oct 25, 2021
On Flask, Semgrep, and Secure CodingFirst steps with Flask and Static Code Analysis with SemgrepSep 4, 2021Sep 4, 2021
Third-party Software Dependencies: You have to look beyond the download metricsPackage download metrics are easy to manipulateJul 6, 2021Jul 6, 2021
Published inGeek CultureSome use cases for HTTP HEADHTTP HEAD is an interesting and powerful HTTP method.Jun 28, 2021Jun 28, 2021
Getting some traction on SAST testingSAST or Static Application Security Testing or sometimes refer as Static Source Code Analyzer is a security mechanism in which source code…Jun 14, 2021Jun 14, 2021