
MDIC Threat Modeling Bootcamp
In February I was fortunate to be selected to take part in a week long Threat Modeling Bootcamp (4 hours each workday) …
In February I was fortunate to be selected to take part in a week long Threat Modeling Bootcamp (4 hours each workday) …
I was invited to provide an roadmap update on the OWASP SAMM project to our friends in the New Zealand application security …
Tl;dr: Make Technical Debt Visible Repay Technical Debt Incrementally Repay the High-Interest Technical Debt First Repay Technical Debt While Performing Customer-Valuable Work …
At some point in the recent past – probably a steering committee meeting – I was asked about Feature sizing. I didn’t …
In 2014, Google announced that it was embarking on a mission to make the web more secure, using HTTPS as a ranking signal in …
I took a trip to Chicago June 5-9 for a information packed conference with some colleagues in order to learn more about current trends …
November 25, 2015. Particle dress by Dutch fashion designer Iris van Herpen at a special exhibit at the High Museum of Art in …
November 25, 2015. Engaging experience made possible by Anish Kapoor at the High Museum of Art, Atlanta, Georgia.
In this paper, I will suggest that the application of data mining to large data sets and repositories of genealogical information, along …
So I wrote the following piece of code to display the random image above, mainly so I could show off my photos …
A common problem with posting to newsgroups is that unless you have a very good spam filter, or you use a disposable …
One of two presentations given at the 2003 Annual Slice of Life Workshop: for Medical Multimedia Developers and Educators.