🔒 Our free AWS Well-Architected Mini Assessment helps uncover hidden risks, security gaps, and best-practice improvements before anything goes missing.
👉 Take 10 minutes to check how secure your environment really is: wafr.online
#CyberSecurity #AWSPartner #SecureByDesign #CloudSecurity
👉 Take 10 minutes to check how secure your environment really is: wafr.online
#CyberSecurity #AWSPartner #SecureByDesign #CloudSecurity
Mini Well-Architected Self Assessment
Complete a free Mini Well-Architected Self Assessment and find our how Well-Architected your AWS environment is in under 5 minutes.
wafr.online
November 10, 2025 at 9:43 AM
🔒 Our free AWS Well-Architected Mini Assessment helps uncover hidden risks, security gaps, and best-practice improvements before anything goes missing.
👉 Take 10 minutes to check how secure your environment really is: wafr.online
#CyberSecurity #AWSPartner #SecureByDesign #CloudSecurity
👉 Take 10 minutes to check how secure your environment really is: wafr.online
#CyberSecurity #AWSPartner #SecureByDesign #CloudSecurity
For defence, cybersecurity is no longer a bolt-on.
Learn how this approach is transforming mission assurance and supply chain trust...
🔗 www.advent-im.co.uk/secure-by-de...
✍️ Ellie Hurst, Commercial Director
#Defence #CyberSecurity #SecureByDesign #Resilience
Learn how this approach is transforming mission assurance and supply chain trust...
🔗 www.advent-im.co.uk/secure-by-de...
✍️ Ellie Hurst, Commercial Director
#Defence #CyberSecurity #SecureByDesign #Resilience
Secure by Design in Defence – From Mission Assurance to Supply Chain Integrity | Advent IM
Secure by Design is reshaping defence cybersecurity — embedding assurance from concept to deployment for lasting mission resilience.
www.advent-im.co.uk
November 4, 2025 at 9:23 AM
For defence, cybersecurity is no longer a bolt-on.
Learn how this approach is transforming mission assurance and supply chain trust...
🔗 www.advent-im.co.uk/secure-by-de...
✍️ Ellie Hurst, Commercial Director
#Defence #CyberSecurity #SecureByDesign #Resilience
Learn how this approach is transforming mission assurance and supply chain trust...
🔗 www.advent-im.co.uk/secure-by-de...
✍️ Ellie Hurst, Commercial Director
#Defence #CyberSecurity #SecureByDesign #Resilience
✨Design isn’t just about beauty — it’s about protection. 🔐
Understand better how UI/UX choices shape the first line of cyber defense and empower users to make safer decisions online.
#SecureByDesign #CyberDefense #UIUX #HumanCenteredSecurity #CyberLens
thecyberlens.com/p/secure-by-...
Understand better how UI/UX choices shape the first line of cyber defense and empower users to make safer decisions online.
#SecureByDesign #CyberDefense #UIUX #HumanCenteredSecurity #CyberLens
thecyberlens.com/p/secure-by-...
Secure by Design: How UI/UX Shapes the First Line of Cyber Defense
Why human-centered experience must stand shoulder to shoulder with digital protection
thecyberlens.com
November 4, 2025 at 3:01 AM
✨Design isn’t just about beauty — it’s about protection. 🔐
Understand better how UI/UX choices shape the first line of cyber defense and empower users to make safer decisions online.
#SecureByDesign #CyberDefense #UIUX #HumanCenteredSecurity #CyberLens
thecyberlens.com/p/secure-by-...
Understand better how UI/UX choices shape the first line of cyber defense and empower users to make safer decisions online.
#SecureByDesign #CyberDefense #UIUX #HumanCenteredSecurity #CyberLens
thecyberlens.com/p/secure-by-...
💻 Innovating Securely
Time: 10:50 - 11:20
Stage: Expert Stage - Harvard (First Floor)
Speaker(s): Zoë Rose
#secureByDesign #BCP
Time: 10:50 - 11:20
Stage: Expert Stage - Harvard (First Floor)
Speaker(s): Zoë Rose
#secureByDesign #BCP
October 23, 2025 at 6:21 AM
💻 Innovating Securely
Time: 10:50 - 11:20
Stage: Expert Stage - Harvard (First Floor)
Speaker(s): Zoë Rose
#secureByDesign #BCP
Time: 10:50 - 11:20
Stage: Expert Stage - Harvard (First Floor)
Speaker(s): Zoë Rose
#secureByDesign #BCP
More details:
- All events are in Person. No livestreaming and no recording
- I will be in the Stockholm, Prague and Malaga events
- Keep an eye on upcoming events here:
cloud.google.com/blog/topics/...
#GoogleCloud #DevFest #Biznagafest #GoogleDevs #Security #SecureByDesign
- All events are in Person. No livestreaming and no recording
- I will be in the Stockholm, Prague and Malaga events
- Keep an eye on upcoming events here:
cloud.google.com/blog/topics/...
#GoogleCloud #DevFest #Biznagafest #GoogleDevs #Security #SecureByDesign
Accelerate AI with Agents: Event Series for Developers in EMEA | Google Cloud Blog
Learn about Google Cloud's "Accelerate AI with Agents" event series in EMEA. Dive deep into AI, agents, and cloud computing with hands-on labs and networking opportunities for developers and tech enth...
cloud.google.com
October 20, 2025 at 8:47 AM
More details:
- All events are in Person. No livestreaming and no recording
- I will be in the Stockholm, Prague and Malaga events
- Keep an eye on upcoming events here:
cloud.google.com/blog/topics/...
#GoogleCloud #DevFest #Biznagafest #GoogleDevs #Security #SecureByDesign
- All events are in Person. No livestreaming and no recording
- I will be in the Stockholm, Prague and Malaga events
- Keep an eye on upcoming events here:
cloud.google.com/blog/topics/...
#GoogleCloud #DevFest #Biznagafest #GoogleDevs #Security #SecureByDesign
#securebydesign and #insecurebyculture , looks a promising roundtable
#cybersecurity #socrates
#CodemotionIT #Exprivia_CY
#cybersecurity #socrates
#CodemotionIT #Exprivia_CY
October 12, 2025 at 5:24 PM
#securebydesign and #insecurebyculture , looks a promising roundtable
#cybersecurity #socrates
#CodemotionIT #Exprivia_CY
#cybersecurity #socrates
#CodemotionIT #Exprivia_CY
The Defence Industrial Strategy is more than industrial policy — it’s a statement that secure, resilient systems and robust risk management are core to UK defence.
#CyberSecurity #DefenceInnovation #RiskManagement #InformationSecurity #UKDefence #SMEs #SecurebyDesign
#CyberSecurity #DefenceInnovation #RiskManagement #InformationSecurity #UKDefence #SMEs #SecurebyDesign
UK to kick off new defence industrial strategy with £250mn on.ft.com/3I8YTwX
UK to kick off new defence industrial strategy with £250mn
Funding for five deals across Britain aims to boost local economic growth
on.ft.com
September 9, 2025 at 11:18 AM
The Defence Industrial Strategy is more than industrial policy — it’s a statement that secure, resilient systems and robust risk management are core to UK defence.
#CyberSecurity #DefenceInnovation #RiskManagement #InformationSecurity #UKDefence #SMEs #SecurebyDesign
#CyberSecurity #DefenceInnovation #RiskManagement #InformationSecurity #UKDefence #SMEs #SecurebyDesign
"Zero-Day Exploits: The Quiet Catastrophe Hiding in Plain Sight"
#ZeroDayExploits, #Cybersecurity, #ThreatIntelligence, #SecureByDesign, #PatchManagement
#CriticalInfrastructure
www.linkedin.com/pulse/zero-d...
#ZeroDayExploits, #Cybersecurity, #ThreatIntelligence, #SecureByDesign, #PatchManagement
#CriticalInfrastructure
www.linkedin.com/pulse/zero-d...
Zero-Day Exploits: The Quiet Catastrophe Hiding in Plain Sight
If you're like me, you enjoy a good comic book villain. In cybersecurity that villian is "Zero Day Exploits!" Picture this: your operations dashboard is calm, the SOC is sipping coffee and the only od...
www.linkedin.com
September 1, 2025 at 1:43 AM
"Zero-Day Exploits: The Quiet Catastrophe Hiding in Plain Sight"
#ZeroDayExploits, #Cybersecurity, #ThreatIntelligence, #SecureByDesign, #PatchManagement
#CriticalInfrastructure
www.linkedin.com/pulse/zero-d...
#ZeroDayExploits, #Cybersecurity, #ThreatIntelligence, #SecureByDesign, #PatchManagement
#CriticalInfrastructure
www.linkedin.com/pulse/zero-d...
Hard-coded secrets, puzzle-piece practices, and role-based access issues make software vulnerable. We build security in from day one because rebuilding later costs more than doing it right.
www.flyingfursoftware.com
#SecureByDesign
www.flyingfursoftware.com
#SecureByDesign
August 27, 2025 at 6:11 PM
Hard-coded secrets, puzzle-piece practices, and role-based access issues make software vulnerable. We build security in from day one because rebuilding later costs more than doing it right.
www.flyingfursoftware.com
#SecureByDesign
www.flyingfursoftware.com
#SecureByDesign
Registration for my "#ThreatModeling for Defenders" training at @BlueTeamCon in Chicago (happening NEXT week - September 4-7, my workshop training on September 4-5) is ending in a few days on August 31.
If you haven't done so yet but thought about it, register soon!
#SecureByDesign
If you haven't done so yet but thought about it, register soon!
#SecureByDesign
🍎 Training Highlight : Hands-on Threat Modeling for Defenders
Roberthurlbut.bsky.social will teach you to identify threats and reduce risks in a hands-on environment and tackle challenges like modeling threats for AI-driven systems and applying the MITRE ATT&CK framework.
buff.ly/ORnmBxO
Roberthurlbut.bsky.social will teach you to identify threats and reduce risks in a hands-on environment and tackle challenges like modeling threats for AI-driven systems and applying the MITRE ATT&CK framework.
buff.ly/ORnmBxO
August 27, 2025 at 4:55 PM
Registration for my "#ThreatModeling for Defenders" training at @BlueTeamCon in Chicago (happening NEXT week - September 4-7, my workshop training on September 4-5) is ending in a few days on August 31.
If you haven't done so yet but thought about it, register soon!
#SecureByDesign
If you haven't done so yet but thought about it, register soon!
#SecureByDesign
A systems approach is key to securing internet infrastructure—resilience demands coordination, not silos. Let’s build smarter, together. 🌐🔒 #InternetResilience #SecureByDesign #BGP
FIxing BGP’s security problems is not proving to be easy
Systems Approach: Securing internet infrastructure remains a challenging endeavour
buff.ly
August 27, 2025 at 10:05 AM
A systems approach is key to securing internet infrastructure—resilience demands coordination, not silos. Let’s build smarter, together. 🌐🔒 #InternetResilience #SecureByDesign #BGP
Lock down your #criticalInfrastructure, #CISA begs admins
www.theregister.com/2025/08/14/c...
Urging companies with #operationalTechnology environments to set a better #cybersecurity posture
#InfoSec #VulnerabilityManagement #SecureByDefault #SecureByDesign
www.theregister.com/2025/08/14/c...
Urging companies with #operationalTechnology environments to set a better #cybersecurity posture
#InfoSec #VulnerabilityManagement #SecureByDefault #SecureByDesign
CISA begs operational technology admins to lock down
: The agency offered some tips for operational technology environments, where attacks are rising
www.theregister.com
August 15, 2025 at 10:49 AM
Lock down your #criticalInfrastructure, #CISA begs admins
www.theregister.com/2025/08/14/c...
Urging companies with #operationalTechnology environments to set a better #cybersecurity posture
#InfoSec #VulnerabilityManagement #SecureByDefault #SecureByDesign
www.theregister.com/2025/08/14/c...
Urging companies with #operationalTechnology environments to set a better #cybersecurity posture
#InfoSec #VulnerabilityManagement #SecureByDefault #SecureByDesign
Build for years, not the moment.
Our vision of a Future Proof Framework delivers Consistency, Reliability, Security & Support that evolve with you. If it’s not built to last, it’s built to be replaced at a cost.
www.flyingfursoftware.com
#FutureProof #CustomSoftware #LongTermValue
Our vision of a Future Proof Framework delivers Consistency, Reliability, Security & Support that evolve with you. If it’s not built to last, it’s built to be replaced at a cost.
www.flyingfursoftware.com
#FutureProof #CustomSoftware #LongTermValue
August 13, 2025 at 4:50 PM
Build for years, not the moment.
Our vision of a Future Proof Framework delivers Consistency, Reliability, Security & Support that evolve with you. If it’s not built to last, it’s built to be replaced at a cost.
www.flyingfursoftware.com
#FutureProof #CustomSoftware #LongTermValue
Our vision of a Future Proof Framework delivers Consistency, Reliability, Security & Support that evolve with you. If it’s not built to last, it’s built to be replaced at a cost.
www.flyingfursoftware.com
#FutureProof #CustomSoftware #LongTermValue
Congrats to Bob Lord and Lauren Zabierek for their move to Institute for Security and Technology (IST) Can’t wait to see what’s next for #SecurebyDesign. www.politico.com/newsletters/...
CISA’s next chapter on election security
With CISA one step closer to filling its top leadership position, election security groups worry that the agency won’t have the capacity to work with state and local officials to secure future electio...
www.politico.com
July 28, 2025 at 8:27 PM
Congrats to Bob Lord and Lauren Zabierek for their move to Institute for Security and Technology (IST) Can’t wait to see what’s next for #SecurebyDesign. www.politico.com/newsletters/...
Congrats to Bob Lord and Lauren Zabierek for their move to the Institute for Security and Technology!
Really looking forward to what’s next for #SecurebyDesign. www.politico.com/newsletters/...
Really looking forward to what’s next for #SecurebyDesign. www.politico.com/newsletters/...
July 28, 2025 at 5:49 PM
Congrats to Bob Lord and Lauren Zabierek for their move to the Institute for Security and Technology!
Really looking forward to what’s next for #SecurebyDesign. www.politico.com/newsletters/...
Really looking forward to what’s next for #SecurebyDesign. www.politico.com/newsletters/...
💡 On Claroty Nexus, Providence CISO Mike Ratliff writes about his organization’s governance, risk, attack surface management, and compliance (#GRAC) model – a rebuild of traditional GRC. nexusconnect.io/articles/reb... #SecureByDesign
Rebuilding Legacy GRC from the Ground Up
Mike Ratliff, CISO at Providence, one of the country's largest not-for-profit healthcare providers, writes about his organization's attempt to re-think GRC as Governance, Risk, Attack Surface Manageme...
nexusconnect.io
July 15, 2025 at 10:26 PM
💡 On Claroty Nexus, Providence CISO Mike Ratliff writes about his organization’s governance, risk, attack surface management, and compliance (#GRAC) model – a rebuild of traditional GRC. nexusconnect.io/articles/reb... #SecureByDesign
Communicate by #Session, no #Metadata, just start app, share generated account key with other party by any means, and connect. You are just a number. That's privacy.
#PrivateMessanger #privacy #Anonymous #SecureByDesign getsession.org
#PrivateMessanger #privacy #Anonymous #SecureByDesign getsession.org
June 22, 2025 at 5:14 AM
Communicate by #Session, no #Metadata, just start app, share generated account key with other party by any means, and connect. You are just a number. That's privacy.
#PrivateMessanger #privacy #Anonymous #SecureByDesign getsession.org
#PrivateMessanger #privacy #Anonymous #SecureByDesign getsession.org
Because the simple truth is:
If you used a device phone number to verify an app, or where it came from, your identity could be linked eventually, given the right resources placed towards you.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
If you used a device phone number to verify an app, or where it came from, your identity could be linked eventually, given the right resources placed towards you.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
Session | Send Messages, Not Metadata. | Private Messenger
Session is a private messenger that aims to remove any chance of metadata collection by routing all messages through an onion routing network.
getsession.org
June 22, 2025 at 5:14 AM
Because the simple truth is:
If you used a device phone number to verify an app, or where it came from, your identity could be linked eventually, given the right resources placed towards you.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
If you used a device phone number to verify an app, or where it came from, your identity could be linked eventually, given the right resources placed towards you.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
So what is as close to secure as possible, assuming your phone is?
Session is as secure as it gets, and depending on how you use it, even moreso.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
Session is as secure as it gets, and depending on how you use it, even moreso.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
June 22, 2025 at 5:14 AM
So what is as close to secure as possible, assuming your phone is?
Session is as secure as it gets, and depending on how you use it, even moreso.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
Session is as secure as it gets, and depending on how you use it, even moreso.
#PrivateMessanger #privacy #Anonymous #SecureByDesign
getsession.org
APIs are being generated at lightning speed (GenAI 🚀), and AI is now a major API consumer (including the malicious kind)
Have you already adopted a secure-by-design approach?
🔒 Tip: Know the OWASP API Top 10
📺 Video breakdown: www.youtube.com/playlist?lis...
#apisecurity #owasp #securebydesign
Have you already adopted a secure-by-design approach?
🔒 Tip: Know the OWASP API Top 10
📺 Video breakdown: www.youtube.com/playlist?lis...
#apisecurity #owasp #securebydesign
2023 OWASP Top 10 API Security Risks - YouTube
The Open Worldwide Application Security Project (OWASP) recently launched a refreshed top 10 list of API security risks. This playlist dives into each of the...
www.youtube.com
June 19, 2025 at 2:59 PM
APIs are being generated at lightning speed (GenAI 🚀), and AI is now a major API consumer (including the malicious kind)
Have you already adopted a secure-by-design approach?
🔒 Tip: Know the OWASP API Top 10
📺 Video breakdown: www.youtube.com/playlist?lis...
#apisecurity #owasp #securebydesign
Have you already adopted a secure-by-design approach?
🔒 Tip: Know the OWASP API Top 10
📺 Video breakdown: www.youtube.com/playlist?lis...
#apisecurity #owasp #securebydesign
If you are using Microsoft #Azure for #OpenAI, #AIServices, or #CognitiveServices leveraging #PrivateEndpoints please up-vote this issue to strongly encourage Microsoft to fix the built-in Azure Policy: github.com/Azure/Enterp...
#Governance #ZeroTrust #SecureByDesign #DNS #CAF #EnterpriseScale
#Governance #ZeroTrust #SecureByDesign #DNS #CAF #EnterpriseScale
Feature Request: Workaround for the built-in policy Configure Cognitive Services accounts to use private DNS zones" (c4bc6f10-cb41-49eb-b000-d5ab82e2a091) · Issue #1994 · Azure/Enterprise-Scale
Referring to issue #1489 The built-in policy c4bc6f10-cb41-49eb-b000-d5ab82e2a091 lacks multiple services as it only registers private endpoints to zone privatelink.cognitiveservices.azure.com. The...
github.com
June 16, 2025 at 2:30 PM
If you are using Microsoft #Azure for #OpenAI, #AIServices, or #CognitiveServices leveraging #PrivateEndpoints please up-vote this issue to strongly encourage Microsoft to fix the built-in Azure Policy: github.com/Azure/Enterp...
#Governance #ZeroTrust #SecureByDesign #DNS #CAF #EnterpriseScale
#Governance #ZeroTrust #SecureByDesign #DNS #CAF #EnterpriseScale
Ubuntu 25.10's switch to sudo-rs, a Rust-based sudo, shows a profound commitment to enhancing memory safety and system security.
This move reflects the growing trend of leveraging Rust. thenewstack.io/ubuntu-25-10...
#Ubuntu #Ubuntu2510 #sudoRS #RustLang #MemorySafety #SecureByDesign #Security
This move reflects the growing trend of leveraging Rust. thenewstack.io/ubuntu-25-10...
#Ubuntu #Ubuntu2510 #sudoRS #RustLang #MemorySafety #SecureByDesign #Security
Ubuntu 25.10 Replaces sudo With a Rust-Based Equivalent
The new sudo-rs is meant to be a near drop-in replacement for sudo, but some of the less secure aspects of sudo will not be supported.
thenewstack.io
June 14, 2025 at 6:14 AM
Ubuntu 25.10's switch to sudo-rs, a Rust-based sudo, shows a profound commitment to enhancing memory safety and system security.
This move reflects the growing trend of leveraging Rust. thenewstack.io/ubuntu-25-10...
#Ubuntu #Ubuntu2510 #sudoRS #RustLang #MemorySafety #SecureByDesign #Security
This move reflects the growing trend of leveraging Rust. thenewstack.io/ubuntu-25-10...
#Ubuntu #Ubuntu2510 #sudoRS #RustLang #MemorySafety #SecureByDesign #Security
Finally got around to writing a follow-up regarding organizations sacrificing foundational #security for business velocity. Fueled by conversations I had at #Identiverse, I explore why we aren’t building #SecureByDesign systems, even when we know how?
#ZeroTrust #Identity #SaaS #Compliance
#ZeroTrust #Identity #SaaS #Compliance
Secure-by-Design has an Incentive Problem – Talking Identity
blog.talkingidentity.com
June 12, 2025 at 1:26 PM
Finally got around to writing a follow-up regarding organizations sacrificing foundational #security for business velocity. Fueled by conversations I had at #Identiverse, I explore why we aren’t building #SecureByDesign systems, even when we know how?
#ZeroTrust #Identity #SaaS #Compliance
#ZeroTrust #Identity #SaaS #Compliance
Refund scam. You follow the caller’s steps. Your money disappears.
ObligeAI would’ve flagged the transaction, paused it, and verified your ID in real time with gestures.
No match means no money moved.
Learn more: obligeai.com
#ObligeAI #SecureByDesign #IdentityProtection
ObligeAI would’ve flagged the transaction, paused it, and verified your ID in real time with gestures.
No match means no money moved.
Learn more: obligeai.com
#ObligeAI #SecureByDesign #IdentityProtection
June 5, 2025 at 12:39 AM
Refund scam. You follow the caller’s steps. Your money disappears.
ObligeAI would’ve flagged the transaction, paused it, and verified your ID in real time with gestures.
No match means no money moved.
Learn more: obligeai.com
#ObligeAI #SecureByDesign #IdentityProtection
ObligeAI would’ve flagged the transaction, paused it, and verified your ID in real time with gestures.
No match means no money moved.
Learn more: obligeai.com
#ObligeAI #SecureByDesign #IdentityProtection