Deploying Securely
Subscribe
Sign in
Home
Products
Ghostwriting
Archive
About
New
Top
Discussion
The Deploy Securely risk assessment model - version 1.0.1
Scoring non-CVEs.
Walter Haydock
Apr 15, 2022
6
1
Share this post
The Deploy Securely risk assessment model - version 1.0.1
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Reviewing Palantir's vulnerability management program
Major points for transparency, but room for improvement.
Walter Haydock
Oct 7, 2022
5
Share this post
Reviewing Palantir's vulnerability management program
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Deconstructing the National Cybersecurity Strategy
All the wheat and none of the chaff.
Walter Haydock
Mar 3
4
Share this post
Deconstructing the National Cybersecurity Strategy
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
What is the difference between supply chain, third-party, and vendor risk management?
And how to measure the risk correctly.
Walter Haydock
Feb 10
9
Share this post
What is the difference between supply chain, third-party, and vendor risk management?
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Managing your risk surface
Why you generally shouldn't care too much about individual vulnerability counts.
Walter Haydock
Jun 24, 2022
4
Share this post
Managing your risk surface
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Exploit Prediction Scoring System (EPSS): a deep dive
A generally good tool for evaluating CVE exploitability.
Walter Haydock
Feb 28, 2022
4
Share this post
Exploit Prediction Scoring System (EPSS): a deep dive
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
But is it exploitable?
Studies examining the risk posed by CVEs.
Walter Haydock
Sep 2, 2022
5
1
Share this post
But is it exploitable?
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Revealing the government's approach to vulnerability management
A deep dive into the multitude of federal systems for prioritizing known software security flaws.
Walter Haydock
Nov 5, 2022
4
2
Share this post
Revealing the government's approach to vulnerability management
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Generative artificial intelligence (AI) security policy template
Deploying Securely with ChatGPT
Walter Haydock
Mar 16
2
2
Share this post
Generative artificial intelligence (AI) security policy template
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
What software security regulation should (not) look like
A response to CISA's recent Foreign Affairs piece.
Walter Haydock
Feb 3
5
10
Share this post
What software security regulation should (not) look like
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
ChatGPT's implications for cybersecurity
A roundup and some potential future developments.
Walter Haydock
Dec 16, 2022
Share this post
ChatGPT's implications for cybersecurity
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
The Chinese Government was probably responsible for the 2022 LastPass hack
A speculative attribution.
Dec 31, 2022
1
Share this post
The Chinese Government was probably responsible for the 2022 LastPass hack
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts