Founders often ask me how they can secure their applications, systems, and networks without overwhelming their limited resources. I’ve written this article to help startups embed security into their DNA
Delivered at ISACA Silicon Valley – January 16, 2025 On January 16, I had the honor of speaking at ISACA Silicon Valley on a topic that’s close to my heart: Threat Modeling—Building Resilient
Mobile applications are everywhere—from managing your finances to unlocking your car. But with convenience comes risk. In 2016, OWASP (Open Web Application Security Project) released its Mobile Top 10 list
Threat modeling is the security process by which we can identify, categorize, and analyze the threats. Generally, threat modeling is done at an early stage in the software development lifecycle