Articles by Dan
Lessons learned from operating a bug bounty programme, and some tips for launching your own
A basic primer on Cross-site scripting (XSS) and its prevention
Tips for effective password usage, for both end users and system administrators
Phishing attacks are difficult to entirely prevent against, but are a good example of a situation in which “defence in depth” is appropriate.
Utility companies have customers. And just like us, those customers expect a ubiquitous, always-on service provision. Are there therefore any lessons we can learn from an old, established industry like a utility company on how to handle outages?