PinnedPost-quantum cryptography — KyberCRYSTAL-Kyber example open-source librariesOct 24, 2024Oct 24, 2024
SAST,DAST, SCA is it enough?Relying solely on a mechanized security approach might not be the most effective strategy. It’s time to explore a more balanced solution!Dec 19, 2024Dec 19, 2024
OWASP Top 10 for LLM with practical training — part 1In mid-November 2025, OWASP released a great analysis of the 10 most significant risks related to LLM (Large Language Models) applications…Dec 3, 20241Dec 3, 20241
Transition to cybersecurity -will hurtFor many IT professionals, transitioning into the field of cybersecurity is an appealing career move. With the increasing importance of…Mar 27, 2024Mar 27, 2024
Frugality and threat modelingHere are some thoughts on the value of adopting frugality within the Software Development Life Cycle (SDLC) and the role of threat modeling…Feb 26, 2024Feb 26, 2024