What would Easter be without Easter Eggs and the taste of chocolate? Software, on the other hand, does not need Easter Eggs. Probably, there will be a few undocumented features accidentally anyway, without anyone implementing those on purpose. What about cake, then? Do you prefer your cake with or without easter eggs?
Category Archives: Uncategorized
Sour phishing and sweet pie: the tastes of Valentine’s Day
Valentine’s Day is the time of roses, chocolate, phishing, and malware. Yep, the love letters you are getting to your inbox might be a scam!
Cybersecurity is not scary!
Hack! Data breach! Killware! Halloween is the perfect time to think that Is cybersecurity really so scary?
Apple pies and integer overflows
Autumn is apple season, so I started yearning for a yummy apple pie. Coincidentally, Apple recently released a patch for an arbitrary code execution vulnerability caused by an integer overflow. What a perfect excuse for baking an apple pie!
You should monitor logs like a cake in the oven
Recently I tried out a new cookie recipe and was unsure how long to keep the cookies in the oven. I had to watch quite closely that I’m not burning them. That reminded me about log monitoring, a crucial part of security that sometimes gets overlooked.
Threat modeling baking – when bread falls on the buttered side
Several things can go wrong with baking: meringue flattens, cookies are burnt, the cake is raw on the inside. These are something you can prepare for. Similarly, in cybersecurity, you can identify problems early and plan mitigations. This is called threat modelling. I’ll introduce threat modeling through baking analogies.
When cybersecurity goes overboard (and your cake too)
Especially chocolate cakes seem to sometimes be so filled, stuffed and topped with all sorts of chocolate that they go overboard. In fact, cybersecurity can also go a bit overboard sometimes. I’ll share my experiences of getting too enthusiastic and over the top with security along with a very chocolatey cake recipe.
Introducing Bake Security In
I thought that why not: let’s combine information security and baking! So begins Bake Security In, a blog dedicated to cybersecurity and yummy baking recipes.
