Sitemap
Blog Posts
- 04/28/2025 Putting Numbers on Fuzzy Risks: The FAIR Approach
- 04/23/2025 What Verizon's Latest Hacker Report Tells Us (And What to Do About It)
- 04/17/2025 Single Point of Failure - Lessons from the CVE Funding Scare
- 04/16/2025 Thinking Through rprobe v0.8.0
- 04/13/2025 How C++23 Makes constexpr More Practical (and Why You Should Care)
- 04/09/2025 Staying Current with Astro: An Update Saga Featuring Erudite
- 02/22/2025 A Better Way to Handle Errors in C++23
- 02/11/2025 A Lexer And Parser For A Simple Language
- 02/10/2025 The Door Wedge Is A Lesson in Cybersecurity
- 02/08/2025 When TLS Is Not Enough
- 01/25/2025 Building Secure Password Generation Tools: My Tool npwg
- 01/22/2025 The Rust Security Myth: Why Migrating from C++ Wont Solve Your Security Problems
- 01/17/2025 Understanding std::byteswap in C++
- 01/11/2025 Corruptissima re publica plurimae leges
- 01/05/2025 AI Kills the Photo Star?
- 01/04/2025 Gmail AI Assistant: Convenient But Potentially Compromised
- 01/02/2025 Rethinking Strings with std::string_view
- 12/31/2024 Happy New Year 2025
- 12/21/2024 SIMD As A Gateway to High-Performance Parallel Computing
- 12/20/2024 Bitcoin and Quantum Computers: Is the Blockchain Really at Risk?
- 12/19/2024 Why "Following the Science" in Cybersecurity Is Misguided
- 12/06/2024 Structured Bindings: A Handy Tool for CPP
- 12/03/2024 NIS2 in Germany: Overregulation and Systemic Challenges
- 11/21/2024 Challenges in Cyber Risk Management
- 11/20/2024 A Reality Check on the Promise to Eliminate Passwords
- 11/17/2024 Advanced Mermaid: Beyond Basics
- 11/15/2024 GnuPG Deep Dive: Get Into The Guts
- 11/11/2024 Bcrypt Cache Key Vulnerability in Okta Authentication
- 11/09/2024 The Dresden Data Breach of 2024 and DLP
- 11/08/2024 A Fun Guide to Email Security And Why Emails Are Postcards
- 11/04/2024 German Economy Loses Momentum
- 10/28/2024 Do Large Language Models Have Ideologies?
- 10/25/2024 Imprint terror in Germany
- 10/24/2024 Breaking the Bit Barrier: A Story of Limited Randomness
Tags
Risk Assessment FAIR Cybersecurity Quantitative Analysis Risk Management Business Decisions DBIR Ransomware Vulnerabilities Third-Party Risk AI Security CVE Vulnerability Management Threat Intelligence MITRE NVD Security rprobe Web Reconnaissance Security Tools TLS Analysis Content Analysis Web Security Screenshots Reporting Tool Development DevOps C++ C++23 constexpr Compile-time Performance Standard Library Programming astro erudite blog Error Handling Monadic Operations Functional Programming lexer parser rust compiler programming languages Security Awareness Policies Workarounds TLS Email Security GDPR End-to-End Encryption Legal Data Protection Password Generation Rust Software Development Open Source Memory Safety Software Engineering Code Migration Tech Hype std::byteswap Endianness System Programming Networking File I/O Digital Services Act DSA Free Speech State Control Orwellian Censorship Surveillance getty shutterstock merger stock-media ai Gmail Google Workspace Prompt Injection Information Security string_view API Design Modern C++ New Year Reflections Personal Blog SIMD High-Performance Computing Parallel Processing Bitcoin Quantum Computing Cryptography Blockchain Quantum-safe Algorithms Security Policy Security Strategy Structured Bindings Code Simplification NIS2 Regulation SMEs Critical Infrastructure Compliance Data Privacy EU Data Security Data Breach Supply Chain Risk Passkeys Passwords Authentication Identity Zero Trust MFA 2FA Mermaid Diagramming Documentation Visualizations Sequence Diagrams Class Diagrams State Diagrams Network Diagrams Dependency Graphs GnuPG Encryption Key Management OpenPGP Vulnerability Okta AD LDAP Dresden Data Leakage Prevention DLP Email PGP S/MIME SMTP Policy Economy Germany DIHK Survey Economic Trends Economic Development Economic Policy llm study bias legal terror DDG Imprint Video Game Development NES Early Gaming Innovation Nasir Gabelli Tetris Game Design Creativity