Related Video PDF Open (new tab): /pdf/Security_Testing_as_Code_en.pdf If you canāt view the PDF, open it here: /pdf/Security_Testing_as_Code_en.pdf ...
š„ A Mind That Dissects Systems
š„ Trust and Culture Beyond Technology
š„ Code That Fixes, Not Just Runs
WAF/IPS/IDS Detection Gap Analysis and Remediation Direction
A structural analysis of WAF, IPS, and IDS detection gaps, focused on parsing discrepancies, visibility failures, and practical remediation priorities.
Contracts vs Security Governance ā Contracts Enforce. Governance Decides.
Contracts enforce decisions. Governance makes the decisions worth enforcingāa structural reframing for contract-centric security leadership.
eIDAS 2.0 vs. Koreaās Digital Identity System: A Comparative Analysis
A governance, privacy, and operations comparison between the EUās eIDAS 2.0 (EUDI Wallet) and Koreaās mobile ID plus private identity verification (CI/DI) ecosystem.
Amadey Malware: A Comparative Study of Static Detection vs Memory-Based Detection
Using Amadey as a case study, this post compares static signature detection and memory-based detection through structure, evasion difficulty, and YARA usage.
The Visibility Principle: How Internal Vulnerability Visibility Shapes Remediation Behavior
A practical, research-informed look at why transparent internal vulnerability visibility can increase remediation participation and improve patch outcomesāthrough accountability, perceived surveillance, and deterrence mechanisms.
Attack Surface Management in 2025: Why Continuous Visibility is Essential
Why continuous visibility and attack surface management (ASM) are essential in 2025, with key trends, survey insights, and practical takeaways.
The Gap Between CISO Strategy and Execution: The WAF Debate and Field Leadership Report
Preface: The Crack Between Philosophy and Execution First half of 202x. When the groupās penetration test report stated, āSQL Injection possible in WAF-unprotected section,ā the CISO was silent for a while. The report was blunt, the attack was classic, and there was no defense. āWas I wrong? Or did they misunderstand my intentionā¦?ā The CISO was a leader of strong conviction. He believed that with a strategy of āIPS + security by design,ā it was possible to build a system robust enough to forgo WAF deployment. In fact, for years, this strategy contributed to the organizationās threat detection and incident prevention. ...
The Limitations of 'Secure' SSRF Patches: Advanced Bypasses and Defense-in-Depth
No Silver Bullet: Folklore & Modern Meaning The phrase āno silver bulletā originated in European folklore, where silver bullets were believed to be uniquely effective against supernatural creatures like werewolves or vampires. The earliest documented use appears in Walter Scottās 1816 Tales of My Landlord, and historical cases such as the 1765 Beast of GĆ©vaudan reference silver bullets as a last resort against mysterious threats. Over time, the expression evolved: today, āno silver bulletā means there is no single, simple solution to complex problemsāa message popularized in software engineering by Fred Brooksā 1986 essay. This post applies that lesson to SSRF defense: beware of one-size-fits-all fixes, and look deeper than folklore or quick patches. ...
Exception Serialization Patterns in OpenStack Nova: Theoretical RCE Risks and Lessons Learned
Analysis of potential Remote Code Execution vulnerability in OpenStack Novaās exception serialization mechanism, including multiple PoC scenarios and defense recommendations.
















