DICOM Security 102: Diving into Files

DICOM Security 102: file format internals — the 128-byte preamble, TLV elements, and why integrity is opt-in nobody opts into.

Threat Models and Whitewater River Paddling

The same risk-thinking that runs a medical device threat model runs a whitewater rafting trip. A side-by-side.

Medical Device Security: The IT vs OT Security Debate

Medical device security doesn't fit cleanly into IT or OT. Where each analogy works, where it breaks, and why devices lean OT.

DICOM Security 101: Network Security with Nmap

DICOM Security 101: network-level attack surface, what Nmap's DICOM scripts actually do, and a walkthrough of my fingerprinting PR.

Threat Modeling Generation Taxonomy

All threat modeling methods abstract reality; what differs is the entry point. A taxonomy of how generation methods produce threats.

The Security Mindset: A Field Guide for Junior Engineers

A field guide for junior security engineers — divergent thinking, persistence, and the mindset multiplier that beats any tool or cert.

Beyond Threat Model Templates

Asset-centric templates can't capture business risk. A more matured take that mixes templates, process, and user-needs threat modeling.

PASTA, Attack Trees, Did We Do a Good Job, and the Infrastructure Nobody Built

Scoring timing (CVSS vs CWSS vs SSVC), PASTA's gaps, where to start a model, and the threat-modeling infrastructure nobody has built yet.