Posts about

Policy

New OMB Guidance to Software Producers

Read More

Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers

A few weeks ago , while watching the Hadza: Last of the First documentary, I...

Read More

Malware Risks in Open Source Code

Snippet: Malware in open-source code can create security vulnerabilities,...

Read More

Malicious Uses of Blockchains

Malicious Uses of Blockchains This blog post will briefly explain what...

Read More

TSA Pipeline Security Guidelines and ADR

In April 2021, the Transportation Security Administration (TSA) updated its

Read More

We joined 18 other companies to call for a prioritization of Critical Infrastructure security in the American Jobs Plan.

What a time to be alive. A group letter has been created and sent, asking...

Read More

Red Team Non-Attributable Infrastructure and the Executive Order

The January 19, 2021 Executive Order on Taking Additional Steps to Address...

Read More

Parsing an Executive Order: Streaming on Your TV Soon

TL;DR: The Executive Order’s proposed know your customer-style and...

Read More

Breaching Terms of Service Doesn’t Breach the CFAA: Protect Independent Security Research

Advances in securing medical devices, vehicle systems, and any of the other...

Read More