Deploy Securely
Subscribe
Sign in
Home
Notes
Services
Case studies
Topics
About
Vulnerability management
Latest
Top
Discussions
SecureForge is a scam
How I uncovered a highly polished gray mail "vulnerability disclosure" phishing site.
Sep 4
•
Walter Haydock
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 4
Reporting your results.
Oct 20, 2023
5
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 3
Doing the math for AI risk.
Oct 13, 2023
3
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 2
Defining business and security requirements.
Oct 6, 2023
3
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 1
Setting the scope.
Sep 29, 2023
•
Walter Haydock
16
5
How to track AI vulnerabilities?
Not like the existing CVE regime.
Aug 25, 2023
•
Walter Haydock
10
Set up CISA Cyber Hygiene and put it on autopilot
The good, the bad, the ugly.
May 19, 2023
•
Walter Haydock
2
Vulnerability chaining: part 2, breaking through the exterior
Turning ideas into action.
Apr 7, 2023
•
Walter Haydock
1
Vulnerability chaining: part 1, a logical model
Laying the groundwork for a statistical one.
Mar 24, 2023
•
Walter Haydock
4
Can ChatGPT convert unstructured vulnerability reports into CycloneDX VEX statements (and vice versa)?
Diving into AI applications for cybersecurity.
Mar 10, 2023
•
Walter Haydock
2
What do exploit, exploitable, and exploit code mean in cybersecurity terms?
Trying to clear up some confusion.
Feb 24, 2023
•
Walter Haydock
1
What software security regulation should (not) look like
A response to CISA's recent Foreign Affairs piece.
Feb 3, 2023
•
Walter Haydock
5
7
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts