Architecting Security
Subscribe
Sign in
Home
Notes
Archive
About
Threat Modeling: The Only Proactive Security Assessment
Learn how threat modeling prevents security vulnerabilities before they happen. Discover why it's the only proactive security assessment, plus practical…
Oct 20
•
Andrzej Dyjak
1
Security Assessment Types: A Complete Guide for Tech Leaders
Learn the 5 key security assessment methods—from threat modeling to red teaming. Discover when to use each type in your organization's road to security…
Oct 13
•
Andrzej Dyjak
January 2025
OWASP ASVS: A Blueprint for Verifying and Engineering Secure Applications
How can you verify that your application is truly secure? The OWASP ASVS provides an answer to this question with its systematic approach to application…
Jan 19
•
Andrzej Dyjak
OWASP Top 10: What Every Developer Should Know About It
Web security can feel like an alphabet soup of acronyms: CVE, XSS, SSRF, etc. It's easy to get lost in the maze of terminology. Yet, among all these…
Jan 10
•
Andrzej Dyjak
1
Hello World!
New year, new beginnings.
Jan 1
•
Andrzej Dyjak
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts