DICOM Security 102: Diving into Files
16 Apr 2026DICOM Security 102: file format internals — the 128-byte preamble, TLV elements, and why integrity is opt-in nobody opts into.
DICOM Security 102: file format internals — the 128-byte preamble, TLV elements, and why integrity is opt-in nobody opts into.
The same risk-thinking that runs a medical device threat model runs a whitewater rafting trip. A side-by-side.
Medical device security doesn't fit cleanly into IT or OT. Where each analogy works, where it breaks, and why devices lean OT.
DICOM Security 101: network-level attack surface, what Nmap's DICOM scripts actually do, and a walkthrough of my fingerprinting PR.
All threat modeling methods abstract reality; what differs is the entry point. A taxonomy of how generation methods produce threats.
A field guide for junior security engineers — divergent thinking, persistence, and the mindset multiplier that beats any tool or cert.
Asset-centric templates can't capture business risk. A more matured take that mixes templates, process, and user-needs threat modeling.
Scoring timing (CVSS vs CWSS vs SSVC), PASTA's gaps, where to start a model, and the threat-modeling infrastructure nobody has built yet.