Introducing the book – Threats: What Every Engineer Should Learn From Star Wars

Adam Shostack, the author of “Threat Modeling: Designing for Security”, and the co-author of “The New School of Information Security”, recently launched his new book – “Threats: What Every Engineer Should Learn From Star Wars”. In this Help Net S… Continue reading Introducing the book – Threats: What Every Engineer Should Learn From Star Wars

What would be the security rationale for a hotel blocking only SSH traffic?

I recently stayed at a hotel where outbound SSH traffic (and seemingly only SSH traffic) was blocked on the guest WiFi network, and I’m trying to figure out what security-based rationale they might have had for this policy. Unfortunately, … Continue reading What would be the security rationale for a hotel blocking only SSH traffic?

What is software threat modeling and how to use it effectively

The importance of software threat modeling continues to grow. NIST advises software engineers to adhere to secure software development best practices and do software threat modeling repeatedly during the development process, especially when creating ne… Continue reading What is software threat modeling and how to use it effectively

What are the security implications of using an old computer with no more BIOS updates?

What are potential security implications of using older unsupported motherboards/laptops that do not get BIOS(UEFI) updates anymore, but run an up to date GNU/Linux distribution?
Do measures like using secure boot or setting up a BIOS pass… Continue reading What are the security implications of using an old computer with no more BIOS updates?