Architecting Security
Subscribe
Sign in
Home
Notes
Archive
About
Build vs. Buy and Why "I Can Just Build That" Is Costing The Business More Than You Think
When should you build vs. buy software solutions? Learn why "I can just build it" thinking usually costs more than commercial solutions and how to make…
4 hrs ago
•
Andrzej Dyjak
Security Audits Explained: Understanding Compliance-Focused Security Assessments
Most organizations confuse security audits with pentests. Learn why audits measure compliance, not security—and why you still need them anyway.
Nov 3
•
Andrzej Dyjak
October 2025
Threat Modeling: The Only Proactive Security Assessment
Learn how threat modeling prevents security vulnerabilities before they happen. Discover why it's the only proactive security assessment, plus practical…
Oct 20
•
Andrzej Dyjak
1
Security Assessment Types: A Complete Guide for Tech Leaders
Learn the 5 key security assessment methods—from threat modeling to red teaming. Discover when to use each type in your organization's road to security…
Oct 13
•
Andrzej Dyjak
January 2025
OWASP ASVS: A Blueprint for Verifying and Engineering Secure Applications
How can you verify that your application is truly secure? The OWASP ASVS provides an answer to this question with its systematic approach to application…
Jan 19
•
Andrzej Dyjak
OWASP Top 10: What Every Developer Should Know About It
Web security can feel like an alphabet soup of acronyms: CVE, XSS, SSRF, etc. It's easy to get lost in the maze of terminology. Yet, among all these…
Jan 10
•
Andrzej Dyjak
1
Hello World!
New year, new beginnings.
Jan 1
•
Andrzej Dyjak
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts