RealWorldCyberSecurityOff-Topic: Book ReviewThe Little Brown Handbook, Thirteenth EditionFeb 7, 2022Feb 7, 2022
RealWorldCyberSecurityMicrocode Patches Don’t “Fix” Your ProcessorYour Processor Remains ExploitableJun 9, 2020Jun 9, 2020
RealWorldCyberSecurityEver Heard of MINIX? It’s The World’s Most Widely Used Operating SystemHave an Intel Processor? Then you’re a user!Apr 24, 2020Apr 24, 2020
RealWorldCyberSecurityNegative Rings in Intel Architecture: The Security Threats You’ve Probably Never Heard OfNot Actual Protection Rings, But Conceptual Privilege Levels Susceptible To ExploitationApr 22, 2020Apr 22, 2020
RealWorldCyberSecurityYou Can Help Make The Internet Safer And FasterA New Tool Detects If Your ISP Has Implemented Hijacking MitigationsApr 19, 2020Apr 19, 2020
RealWorldCyberSecurityDefining CybersecurityIf You Can’t Properly Define Cybersecurity, How Can You Know What It Is?Apr 14, 2020Apr 14, 2020
RealWorldCyberSecurityYou Call That A Security Requirement?Proper Requirements Are The First Step To Verifiable SecurityApr 11, 2020Apr 11, 2020
RealWorldCyberSecurityThe First Question I Ask When Interviewing Someone For A Security RoleA Guide To Learning How Well A Candidate Understands SecurityApr 7, 2020Apr 7, 2020
RealWorldCyberSecurityThe Internet Is Not A Seven Layer NetworkRFC1122 Specifies Only Four Layers in The Internet Protocol StackApr 3, 2020Apr 3, 2020