Architecting Security

Home
Notes
Archive
About
Threat Modeling: The Only Proactive Security Assessment
Learn how threat modeling prevents security vulnerabilities before they happen. Discover why it's the only proactive security assessment, plus practical…
Oct 20 • 
Andrzej Dyjak
1
Security Assessment Types: A Complete Guide for Tech Leaders
Learn the 5 key security assessment methods—from threat modeling to red teaming. Discover when to use each type in your organization's road to security…
Oct 13 • 
Andrzej Dyjak

January 2025

OWASP ASVS: A Blueprint for Verifying and Engineering Secure Applications
How can you verify that your application is truly secure? The OWASP ASVS provides an answer to this question with its systematic approach to application…
Jan 19 • 
Andrzej Dyjak
OWASP Top 10: What Every Developer Should Know About It
Web security can feel like an alphabet soup of acronyms: CVE, XSS, SSRF, etc. It's easy to get lost in the maze of terminology. Yet, among all these…
Jan 10 • 
Andrzej Dyjak
1
Hello World!
New year, new beginnings.
Jan 1 • 
Andrzej Dyjak
© 2025 Andrzej Dyjak
Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture