CISA’s Secure by Design

Hello Protocols, Packets, and Programs,

This March let’s avoid the madness of infosec myths, misconceptions, and mistakes.

Let’s update our threat models.

Let’s pay attention to modern designs.

Let’s spend less time enumerating common vulns and more time eradicating vuln classes.

Let’s use public Wi-Fi with our up-to-date devices.


Check out the show notes for links to the articles we covered. And remember to subscribe.