Cybersecurity Category
Covering all aspects of security, threats, and best practices.
04/16/2025
The Imminent Funding Lapse of the CVE Database: A Cybersecurity Crisis
by Frank Rietta
Breaking news: The CVE database faced a funding lapse, crucial for tracking cyber threats. However, CISA has extended its contract, ensuring continued security coordination for the moment. The long-term impact remains uncertain.
04/04/2025
Understanding Signal Messaging App Security: Is Encryption Enough?
by Frank Rietta
Signal security explained: Learn how end-to-end encryption works, threat models, and why security is more than just encryption. Understand Signal's strengths & limits.
05/14/2024
UUID as a secure API token for API RESTful endpoints? (Video)
by Frank Rietta
Video excerpt about the role of UUIDs as a security identifier for REST API and how to use them more securely if you must.
11/28/2023
An Honest Conversation About Cyber Security (Video)
by Frank Rietta
I recently sat down with Jeremy Duvall of 7Factor Software to discuss Cyber Security and application developers. Enjoy this video!
09/27/2023
Prioritizing cybersecurity (Pluralsight)
by Frank Rietta
The structure and siloing of a large enterprise organization can thwart security efforts. Here is a tip on how to overcome.
10/01/2021
You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.
by Frank Rietta
Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.
07/07/2021
Paying Ransomware is Harmful: Invest in proactive defense instead.
by Frank Rietta
Paying the pirates has never been a good idea. The long history shows that paying the ransom only increases the financial incentives for more ransoms. Here is how you can use Threat Actor / Capability modeling and practically free counter measures to protect yourself.
06/30/2021
Top 5 Cyber Security Self-Defense Tips for Businesses with Custom Applications
by Frank Rietta
Since there is no Internet coast guard coming to your aid, here are the top five tips for your company to be better prepared for your own self-defense against cyber attack.
05/25/2021
Cross-site Scripting Injection Attacks Using SVG Images
by Christopher Davis
Cross-Site Scripting attacks can come from a variety of vectors, this article is an explanation of an unusual vector where javascript is embedded within a scalable vector graphics image.
05/11/2021
Lava lamps providing randomness for security!
by Frank Rietta
Lava Lamps as a security tool is an old idea, once covered by a patent. This is why I proudly display a Lava Lamp in my office within my web cam shot.