When a company invests heavily in firewalls, encryption, and training, they often assume they’ve achieved a state of perfect security.
An Idea Log
When a company invests heavily in firewalls, encryption, and training, they often assume they’ve achieved a state of perfect security. In reality, this is an
Read more
It’s one of the most common mistakes in tech: confusing Data Security and Data Privacy. When building a system, especially one that handles user or
Read more
I am delighted to share a significant milestone in my research journey: the acceptance of our latest paper, “A Multi-Objective Scheme for Collision Avoidance, Swarm
Read more
In the world of software engineering, we often focus on building things that work. But true resilience lies in designing systems that know how to
Read more
In the world of cybersecurity, there’s a common paradox: the biggest threats aren’t zero-day exploits (flaws no one knows about), but known vulnerabilities for which
Read more
If you’re building software today, your security strategy must start with the OWASP Top 10. More than just a list of flaws, this document—published by
Read more
If you’ve ever signed up for a new app using “Log in with Google” or “Connect with Spotify,” you’ve used OAuth 2.0. This protocol is
Read more
In the digital world, every application we build is a potential target. Yet, far too many development teams still treat security as an afterthought—a quick
Read more
Artificial Intelligence is changing the way we make decisions — from who gets a loan, to who gets a job interview, to who is flagged
Read more
Hello, and welcome to my blog! Today, I want to talk about something truly thrilling and transformative that I’ve been a part of: a groundbreaking
Read more