Why "Following the Science" in Cybersecurity Is Misguided
An analysis of why strictly following scientific approaches in cybersecurity can be problematic and may not account for real-world complexity
All my latest posts and articles
An analysis of why strictly following scientific approaches in cybersecurity can be problematic and may not account for real-world complexity
An in-depth look at structured bindings in C++, how they simplify code, and practical examples of their usage.
A critical analysis of NIS2 in Germany, highlighting overregulation, challenges, and its impact on businesses and cybersecurity.
Cybersecurity risk management is not easy—it is about managing assets, evolving threats, and building a culture of security.
In the article we will discuss the reality of eliminating passwords with Passkeys and the challenges that come with it.