A comprehensive collection of security research, frameworks, and methodologies developed over two decades in information security, covering assessment types, threat modeling, web application security, and the evolving security landscape.
Information Security Definitions
Authoritative taxonomy of security terminology and operational definitions
Comprehensive field analysis: attack/defense dynamics, career paths, and operational requirements
Threats, Vulnerabilities, and Risks
Formal classification system for security primitives
Secrecy (Obscurity) is a Valid Security Layer
Empirical analysis of obscurity as legitimate security control when properly implemented
Efficient Security Principle (ESP)
Game-theoretic model explaining persistent low security baselines through economic incentives
We Can't Really Affect AI Security
Application of ESP to AI security adoption dynamics
Information Security Assessment Types
Comprehensive taxonomy: vulnerability assessments, penetration tests, red teams, audits, threat modeling
Vulnerability Assessment vs. Penetration Test
Goal-oriented vs. list-oriented security testing methodologies
When to Use Different Assessment Types
Decision framework for assessment type selection
Team structures, operational roles, and interaction patterns
SOC terminology and operational classification
Password vs. TouchID vs. FaceID Threat Model
Quantitative threat modeling for authentication methods
Threat Modeling Against Apple's TouchID
Biometric authentication vulnerability analysis
Account recovery vulnerability assessment
ATHI — AI Threat Modeling Framework
Structured framework: Actor, Technique, Harm, Impact analysis
The AI Attack Surface Map v1.0
Comprehensive AI system vulnerability taxonomy
How to Explain SQL Injection to Anyone
Pedagogical approach to SQL injection mechanics
Standard vs. Blind SQL Injection
Comparative analysis of injection techniques
Skill requirement analysis for web security
Attack vector classification and prevention
Cross-site request forgery exploitation patterns
The Sleepy Puppy XSS Framework
XSS payload orchestration system
IoT + SSRF: A New Attack Vector?
Server-side request forgery in IoT environments
Browser security model fundamentals
High-performance web fuzzing methodology
Advanced payload generation techniques
amass — Attack Surface Mapping
Comprehensive reconnaissance automation
High-speed port scanning techniques
Packet capture and analysis fundamentals
Advanced reconnaissance methodology
Firewall architecture and implementation patterns
Demilitarized zone design principles
Port security fundamentals
Intrusion detection implementation
ML in Cyber Attack and Defense
ML application patterns in security operations
Labor market structural analysis
Security rating service critique
Build a Successful InfoSec Career
Career trajectory optimization strategies
Technical interview preparation framework
Additional security content includes: