November 2015



Authorize After You Authenticate

While it is extremely important to assess a user’s identity prior to allowing them to use some systems or conduct certain actions, knowing the user’s identity may not be sufficient…



Earn or Give, but Never Assume, Trust

Software systems comprising more than just a single monolithic component rely on the composition and cooperation of two or more software tiers or components to successfully accomplish their purpose. These…





Case Study in IoT Security

Garage Door Openers: An Internet of Things Case Study As the Internet of Things grows, household appliances are increasingly facing threats that come with being connected to the Internet. Focusing…