The Security Obstructionism (SecObs) Market

This post introduces the Security Obstructionism (SecObs) market, examining its role in enterprise infosec programs, why it’s so pernicious, and why DevSecOps is just SecObs wrapped with the shiny bow of modernity. | Continue reading


@swagitda.com | 2 years ago

Rick and Morty’s Thanksploitation Deciduous Decision Tree

Visualizing the turkey pardon game theory conflict featured in Rick and Morty season 5 episode 6 as a decision tree created using the Deciduous app. | Continue reading


@swagitda.com | 3 years ago

Deciduous: A Security Decision Tree Generator

Introducing Deciduous, a web app that lets you generate security decision trees (aka attack trees) with minimal effort. | Continue reading


@swagitda.com | 3 years ago

Show HN: Deciduous – A security decision tree generator and editor

Continue reading


@swagitda.com | 3 years ago

Creating Security Decision Trees with Graphviz

This post walks through creating a decision tree for pragmatic threat modeling using the open source graph vizualization tool Graphviz (with an AWS S3 bucket containing sensitive data as an example). | Continue reading


@swagitda.com | 3 years ago

On YOLOsec and FOMOsec

This post will explore why both YOLO security (YOLOsec) and FOMO security (FOMOsec) are pernicious disservices to infosec defense and how you can spot them so that you may yeet them from your organization’s security strategy. | Continue reading


@swagitda.com | 4 years ago

Resilience in Security 101

A short primer on what resilience means in information security, intended as a resilience 101 resource for people who build, maintain, and secure systems or lead teams who do. | Continue reading


@swagitda.com | 4 years ago

Hierarchy of Security Product Needs and Vendor Selection v1.0 [Satire]

A look at the infosec industry’s hierarchy of product needs and what drives vendor selection. #antisec | Continue reading


@swagitda.com | 4 years ago

Ransomware: Towards an Economic Equilibrium

This post will explore my thoughts on how the economics of physical ransom translate to digital ransom, and how we as an industry might want to reconceive our current approaches to considering and dealing with ransomware – and the criminals who run ransomware campaigns. | Continue reading


@swagitda.com | 4 years ago