The Second System Effect: Caveats in Software EngineeringEvery software engineer has been there: staring at a codebase they’ve maintained for months or years, feeling a mixture of pride and…Oct 25Oct 25
AI Slop: The Digital Pollution of Our TimeIn the wake of recent natural disasters, a new threat has emerged alongside the physical destruction: AI Slop. This term, rapidly gaining…Oct 141Oct 141
Establishing an Acceptable Use Policy for AIA Step-by-Step Guide to Crafting an Effective AI Usage PolicyAug 31Aug 31
Shared Responsibility of Security Controls: Battling Account Takeovers TogetherIn our hyperconnected world, online services are woven into the tapestry of our daily lives. But with great convenience comes great assumed…Jan 161Jan 161
Biden’s National Cybersecurity Strategy will hold Software Companies liable for defectsIt has been nearly two weeks since the Office of the National Cyber Director has released a National Cybersecurity Strategy grouped into…Mar 14, 2023Mar 14, 2023
Account Takeover (ATO) Maturity ModelThe introduction of a financial fraud maturity model allowing organizations to assess preventative capabilities of an account takeover. The…Feb 14, 2023Feb 14, 2023
Hello World!Another introduction to the cybersecurity community and a commitment to explore the journalist collective we now know as Medium.Mar 29, 2022Mar 29, 2022