<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="/assets/styles/rss-hehj1ie.xsl"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <atom:link href="http://search-lab.hu/rss.xml" rel="self" type="application/rss+xml"/>
        <title>SEARCH-LAB</title>
        <link>http://search-lab.hu/</link>
        <language>en</language>
        <description>Stay updated with SEARCH-LAB's blog. Explore posts on leveraging Generative AI for API testing and the power of embedding for contextual understanding. Discover more innovative insights and project updates.</description>
                                            <lastBuildDate>Mon, 30 Oct 2023 08:12:36 +0000</lastBuildDate>
                                        <item>
                <title>Automate the Automator: Harnessing Generative AI for Robust API Testing</title>
                <link>https://www.scademy.ai/post/automate-the-automator-harnessing-generative-ai-for-robust-api-testing</link>
                <description>Revolutionize API testing by leveraging Generative AI to &#039;Automate the Automator&#039;</description>
                <pubDate>Mon, 30 Oct 2023 08:12:36 +0000</pubDate>
                <link>https://www.scademy.ai/post/automate-the-automator-harnessing-generative-ai-for-robust-api-testing</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/653a288a7784a6ac90ba0f75_robust.webp" medium="image"/>                            </item>
                                <item>
                <title>Unlocking AI&#039;s Full Potential: The Power of Embedding for Contextual Understanding</title>
                <link>https://www.scademy.ai/post/unlocking-ais-full-potential-the-power-of-embedding-for-contextual-understanding</link>
                <description>Have you heard about embedding? If the answer is &#039;no&#039;, then this post is for you.</description>
                <pubDate>Thu, 20 Jul 2023 07:03:22 +0000</pubDate>
                <link>https://www.scademy.ai/post/unlocking-ais-full-potential-the-power-of-embedding-for-contextual-understanding</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/64b7e18467c9169fd1221da6_warehouse.png" medium="image"/>                            </item>
                                <item>
                <title>Verification of dynamic behavior with Large Language Models</title>
                <link>https://www.scademy.ai/post/verification-of-dynamic-behavior-with-large-language-models</link>
                <description>Unleashing LLM Power: Transforming Dynamic Code Testing.</description>
                <pubDate>Fri, 09 Jun 2023 06:59:45 +0000</pubDate>
                <link>https://www.scademy.ai/post/verification-of-dynamic-behavior-with-large-language-models</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/6454b46936e45a5d9468d3e8_dynamic-behaviour-verification.webp" medium="image"/>                            </item>
                                <item>
                <title>Beyond static code analysis - understanding the semantics</title>
                <link>https://www.scademy.ai/post/beyond-static-code-analysis-understanding-the-semantics</link>
                <description>Using static code analyzers in the development phase improves your security posture.</description>
                <pubDate>Wed, 07 Jun 2023 08:32:46 +0000</pubDate>
                <link>https://www.scademy.ai/post/beyond-static-code-analysis-understanding-the-semantics</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/64634e5dff050318e969808f_thinking_robot_looking_at_a_big_monitor.webp" medium="image"/>                            </item>
                                <item>
                <title>A Comparative Look at Static Code Analysis and Large Language Models</title>
                <link>https://www.scademy.ai/post/a-comparative-look-at-static-code-analysis-and-large-language-models</link>
                <description>Semantic examination by GPT-4 reveals findings invisible to SAST.</description>
                <pubDate>Sat, 29 Apr 2023 20:42:37 +0000</pubDate>
                <link>https://www.scademy.ai/post/a-comparative-look-at-static-code-analysis-and-large-language-models</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/644be6774e38f589e0ec7baa_robot-screen.webp" medium="image"/>                            </item>
                                <item>
                <title>Manipulating Machine Minds: The Dark Art of AI Prompt Injection</title>
                <link>https://www.scademy.ai/post/manipulating-machine-minds-the-dark-art-of-ai-prompt-injection</link>
                <description>Are you worried about the safety of your data in the age of AI?</description>
                <pubDate>Wed, 26 Apr 2023 08:17:31 +0000</pubDate>
                <link>https://www.scademy.ai/post/manipulating-machine-minds-the-dark-art-of-ai-prompt-injection</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/644286abae22a6481179819c_sl-1-main.webp" medium="image"/>                            </item>
                                <item>
                <title>Model Extraction Attacks: An Emerging Threat to AI Systems</title>
                <link>https://www.scademy.ai/post/model-extraction-attacks-an-emerging-threat-to-ai-systems</link>
                <description>Creating LLM models is a resource-intensive and time-consuming task.</description>
                <pubDate>Wed, 26 Apr 2023 08:17:31 +0000</pubDate>
                <link>https://www.scademy.ai/post/model-extraction-attacks-an-emerging-threat-to-ai-systems</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/6442845f2862f4c24498593c_ricardinho_a_jet_of_flame.webp" medium="image"/>                            </item>
                                <item>
                <title>GPT-4 limitations</title>
                <link>https://www.scademy.ai/post/gpt-4-limitations</link>
                <description>GPT-4 thinks lightning fast. But only if it knows where to go.</description>
                <pubDate>Wed, 26 Apr 2023 08:15:45 +0000</pubDate>
                <link>https://www.scademy.ai/post/gpt-4-limitations</link><media:content url="https://uploads-ssl.webflow.com/6422ef2fc22c9323e86a67a0/644288573ed232ac91a3b6ba_ricardinho_a_robotic_hand.webp" medium="image"/>                            </item>
                                <item>
                <title>It&#039;s an ERC20 token, so it&#039;s secure, right?</title>
                <link>https://www.securitydrops.com/erc20-token-standard/</link>
                <description>ERC20 and BEP20 are well known token standards in the cryptocurrency world, but they don’t tie the developer’s hand as much as we might think. I created a token that works a bit differently than you would expect.</description>
                <pubDate>Thu, 14 Apr 2022 08:00:00 +0000</pubDate>
                <link>https://www.securitydrops.com/erc20-token-standard/</link><dc:creator>Richard Kovacs</dc:creator><media:content url="https://www.securitydrops.com/content/images/2022/03/coins.jpg" medium="image"/>                            </item>
                                <item>
                <title>To initialize or not to initialize - the dirty pipe vulnerability</title>
                <link>https://www.securitydrops.com/dirty-pipe/</link>
                <description>Around February 2022, an innocent-looking Linux kernel vulnerability corrupted some log files. Digging in and analyzing the root causes led to discovering the dirty pipe vulnerability. This allows attackers with local access to escalate to root. Oh no, was it an overflow again? Not this time; read on to find out!</description>
                <pubDate>Fri, 25 Mar 2022 13:52:06 +0000</pubDate>
                <link>https://www.securitydrops.com/dirty-pipe/</link><dc:creator>Gergely Eberhardt</dc:creator><media:content url="https://www.securitydrops.com/content/images/2022/03/dirty-pipe-nuke.jpg" medium="image"/>                            </item>
                                <item>
                <title>Nobody is wrong, yet everyone knows something is wrong</title>
                <link>https://www.securitydrops.com/log4shell-nobody-is-wrong-cve-2021-44228/</link>
                <description>Every once in a while, there is that stupid one-liner implementation bug that can be found in all critical systems, and that fancy exploitation technique that nobody has thought of in the past century, which results in a security vulnerability that not only disrupts the whole internet, but all hell breaks loose for cybersecurity professionals, IT admins and developers alike. The Log4Shell vulnerability is not one of those. Even though the problem is more severe than that.</description>
                <pubDate>Wed, 15 Dec 2021 09:30:57 +0000</pubDate>
                <link>https://www.securitydrops.com/log4shell-nobody-is-wrong-cve-2021-44228/</link><dc:creator>Attila Szasz</dc:creator><media:content url="https://www.securitydrops.com/2021/12/log4shell.png" medium="image"/>                            </item>
                                <item>
                <title>Injection defenses</title>
                <link>https://www.securitydrops.com/injections-defenses/</link>
                <description>Injection defenses rely on making your code aware of the data structure it manipulates. If it is done well, your data structure internals are exposed just enough, so it is possible to hide them completely. Taking this approach will lead you to think of interfaces as security contracts.</description>
                <pubDate>Wed, 14 Jul 2021 09:30:57 +0000</pubDate>
                <link>https://www.securitydrops.com/injections-defenses/</link><dc:creator>Daniel Szpisjak</dc:creator><media:content url="https://www.securitydrops.com/content/images/2020/02/injection-2248377_1280.jpg" medium="image"/>                            </item>
                                <item>
                <title>The sudo bug</title>
                <link>https://www.securitydrops.com/the-sudo-bug/</link>
                <description>Did you also think that Unix-based operating systems are the superior species in terms of security? Well, maybe you should reconsider that. In early 2021, a severe bug was found in them, which affected many Unix systems. When the report about it arrived, the bug was already patched, but let’s look at it in this article.</description>
                <pubDate>Mon, 26 Apr 2021 15:29:26 +0000</pubDate>
                <link>https://www.securitydrops.com/the-sudo-bug/</link><dc:creator>Richard Kovacs</dc:creator><media:content url="https://www.securitydrops.com/content/images/2021/04/magic-word-sudo.png" medium="image"/>                            </item>
                                <item>
                <title>SecurityDrops joins SCADEMY</title>
                <link>https://www.securitydrops.com/scademy/</link>
                <description>Early March, I and SecurityDrops with me joined SCADEMY - Secure Coding Academy. Expect content. More and better quality content from me and from experienced peers alike. I will dedicate more time to the blog and curating its content.</description>
                <pubDate>Thu, 18 Mar 2021 17:07:32 +0000</pubDate>
                <link>https://www.securitydrops.com/scademy/</link><dc:creator>Daniel Szpisjak</dc:creator><media:content url="https://www.securitydrops.com/content/images/2021/03/scademy_1280_framed.png" medium="image"/>                            </item>
                                <item>
                <title>Injections, where code meets data</title>
                <link>https://www.securitydrops.com/injections/</link>
                <description>Injections are still one, if not the most serious, flaws a developer can make. This post deconstructs the vulnerability and puts it back together to offer you a solid understanding to build on. After reading it, you will never think of injections the same way.</description>
                <pubDate>Fri, 14 Feb 2020 14:52:00 +0000</pubDate>
                <link>https://www.securitydrops.com/injections/</link><dc:creator>Daniel Szpisjak</dc:creator><media:content url="https://www.securitydrops.com/content/images/2020/02/injection-2248377_1280.jpg" medium="image"/>                            </item>
                                <item>
                <title>Use this mental model to learn security</title>
                <link>https://www.securitydrops.com/mental-model/</link>
                <description>Mental models help us learn faster and more efficiently. The security field can be viewed from two different viewpoints. One is very high-level, dealing with abstract ideas. Let’s call it macro. The other deals with the details, of how the smaller parts interact. That’s the micro.</description>
                <pubDate>Thu, 07 Mar 2019 06:18:11 +0000</pubDate>
                <link>https://www.securitydrops.com/mental-model/</link><dc:creator>Daniel Szpisjak</dc:creator><media:content url="https://www.securitydrops.com/content/images/2019/03/pexels-photo-697662-1.jpeg" medium="image"/>                            </item>
                                <item>
                <title>Inside a crypto black-​box</title>
                <link>https://www.securitydrops.com/inside-a-crypto-black-box/</link>
                <description>AES, also known as the Advanced Encryption Standard, is one of the fundamental building blocks of today’s secure communications. Let’s take a peek inside and see how it works.</description>
                <pubDate>Thu, 07 Feb 2019 05:35:39 +0000</pubDate>
                <link>https://www.securitydrops.com/inside-a-crypto-black-box/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Introducing the Labs</title>
                <link>https://www.securitydrops.com/introducing-the-labs/</link>
                <description>Optimal learning happens when theory meets practice. The Securitydrops Labs is designed to give you a training ground to practice your hands-on skills. It gives you a highly configurable web application, where you can play around in a sandbox.</description>
                <pubDate>Wed, 30 Jan 2019 06:56:51 +0000</pubDate>
                <link>https://www.securitydrops.com/introducing-the-labs/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The ends of encryption</title>
                <link>https://www.securitydrops.com/the-ends-of-encryption/</link>
                <description>End-to-end encryption means data is encrypted at the sender and only the final recipient can decrypt it. True end-to-end encryption has excellent privacy and security benefits. However, it also has a cost. As a developer, it is a great pattern to utilize to shield data from 3rd parties.</description>
                <pubDate>Tue, 04 Sep 2018 21:20:55 +0000</pubDate>
                <link>https://www.securitydrops.com/the-ends-of-encryption/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide</title>
                <link>https://www.securitydrops.com/the-web-api-authentication-guide/</link>
                <description>As a web developer, you have various choices regarding API authentication. This guide aims to provide you with a high-level overview of the six most used schemes. Inside, you will find a cheatsheet to help you choose.</description>
                <pubDate>Fri, 22 Jun 2018 08:19:54 +0000</pubDate>
                <link>https://www.securitydrops.com/the-web-api-authentication-guide/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, TLS Client Certificates</title>
                <link>https://www.securitydrops.com/tls-client-certificates/</link>
                <description>TLS mutual authentication doubles down on HTTPS. Using this scheme your clients’ identity is proved by presenting certificates and proving ownership of a private key. This is a very potent tool and also a tradeoff.</description>
                <pubDate>Wed, 25 Apr 2018 21:59:16 +0000</pubDate>
                <link>https://www.securitydrops.com/tls-client-certificates/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Introducing The Glossary</title>
                <link>https://www.securitydrops.com/the-glossary/</link>
                <description>The Glossary describes common security jargon, phrases, abbreviations , and concepts succinctly and in a way that makes sense to you.</description>
                <pubDate>Fri, 23 Mar 2018 12:15:19 +0000</pubDate>
                <link>https://www.securitydrops.com/the-glossary/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, Signature Schemes</title>
                <link>https://www.securitydrops.com/http-signatures/</link>
                <description>HTTP signature schemes provide integrity and authenticity on the application layer. Using them increase security but also incurs complexity.</description>
                <pubDate>Fri, 09 Feb 2018 21:09:13 +0000</pubDate>
                <link>https://www.securitydrops.com/http-signatures/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, Bearer tokens</title>
                <link>https://www.securitydrops.com/bearer-tokens/</link>
                <description>Lots of modern web application utilize bearer tokens. They are ideal for backend integration, but can also be used on the frontend.</description>
                <pubDate>Fri, 19 Jan 2018 14:48:04 +0000</pubDate>
                <link>https://www.securitydrops.com/bearer-tokens/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, Cookies</title>
                <link>https://www.securitydrops.com/auth-cookies/</link>
                <description>Cookies are the de-facto authentication between browser and server. For a good reason, they can provide full-blown session management with low complexity.</description>
                <pubDate>Fri, 12 Jan 2018 22:13:33 +0000</pubDate>
                <link>https://www.securitydrops.com/auth-cookies/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, Digest Auth</title>
                <link>https://www.securitydrops.com/http-digest/</link>
                <description>HTTP Digest Authentication was designed to completely replace Basic Auth. It provides increased security at the cost of significant complexity…</description>
                <pubDate>Tue, 14 Nov 2017 05:20:15 +0000</pubDate>
                <link>https://www.securitydrops.com/http-digest/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, Basic Auth</title>
                <link>https://www.securitydrops.com/basic-auth/</link>
                <description>HTTP Basic Auth has been with us for ages. Some despise it for its insecurity, while others love it for its simplicity. Should you opt for using it or avoid it at all cost?</description>
                <pubDate>Fri, 13 Oct 2017 03:32:14 +0000</pubDate>
                <link>https://www.securitydrops.com/basic-auth/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>The Web API Authentication guide, The intro</title>
                <link>https://www.securitydrops.com/the-web-authentication-guide/</link>
                <description>As a developer, you will most likely get in the situation, where you have to decide how to authenticate your API. How would you deal with it?</description>
                <pubDate>Wed, 27 Sep 2017 04:21:56 +0000</pubDate>
                <link>https://www.securitydrops.com/the-web-authentication-guide/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Data Integrity Primer</title>
                <link>https://www.securitydrops.com/data-integrity/</link>
                <description>Data integrity is rarely talked about, even though it comprises the basis of many data flows a modern web application has to deal with. From a security perspective, integrity deals with protecting data from being modified (by unauthorized parties). There are various techniques to ensure integrity. I will guide you through the options, using real world examples. Once you finish, you will know more about this than most of the industry.</description>
                <pubDate>Wed, 26 Jul 2017 21:34:07 +0000</pubDate>
                <link>https://www.securitydrops.com/data-integrity/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>About trusting data</title>
                <link>https://www.securitydrops.com/untrusted-data/</link>
                <description>“Never trust user input” - say the wise. Sound advice, although it raises more questions than it answers. First of all, what does it mean to trust a piece of data? Why not trust it? Is user input the only piece of data you should be careful with? Can you even trust any data? These are the questions I am exploring in this post.
Assumptions When data enters your system, you are likely to have various assumptions about it.</description>
                <pubDate>Mon, 26 Jun 2017 20:09:17 +0000</pubDate>
                <link>https://www.securitydrops.com/untrusted-data/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Security for Software Engineers</title>
                <link>https://www.securitydrops.com/security-for-software-engineers/</link>
                <description>Solid security knowledge among developers is scarce these days, simply because it is not as spectacular and sexy as a new framework or a cool new tech. Nevertheless, it is real and will not go away anytime soon. Your best bet is to start learning about it right now. It will make you more valuable to your team and your organization. Do not think of this as a massive upfront investment; it is not.</description>
                <pubDate>Fri, 02 Jun 2017 20:53:00 +0000</pubDate>
                <link>https://www.securitydrops.com/security-for-software-engineers/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Session management</title>
                <link>https://www.securitydrops.com/session-management/</link>
                <description>Session management is an integral part of today’s web applications. You receive limited support from the HTTP protocol and have to handle most of this yourself. No wonder session management vulnerabilities consistently make it to the top 3 of the “OWASP Top 10” list. This post aims to introduce you to the model of session management.
Disclaimer This post only covers the basics. The security of session management relies mostly on the IAAA (Identification, Authentication, Authorization, Auditing) model, which builds on session management.</description>
                <pubDate>Sun, 23 Apr 2017 12:10:00 +0000</pubDate>
                <link>https://www.securitydrops.com/session-management/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>360 view of XSS from the trenches</title>
                <link>https://www.securitydrops.com/360-xss/</link>
                <description>When a software developer first gets exposed to web security, he will inevitably memorize his first acronym: XSS! It stands for “cross site scripting”, and it is one of the oldest vulnerabilities around. Its origins are way back in the 90’s when Javascript was the new kid on the block. XSS (back then it was CSS) was its evil little brother, and it still thrives on its sibling’s success. One may wonder “Why is it called cross site scripting?</description>
                <pubDate>Mon, 03 Apr 2017 19:57:06 +0000</pubDate>
                <link>https://www.securitydrops.com/360-xss/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Cookies</title>
                <link>https://www.securitydrops.com/cookies/</link>
                <description>Back in the 90s, someone wanted to store information on the clients, only it was not possible yet. Luckily the Netscape team quickly came to the rescue and implemented cookies. This was a very significant move which shaped the things to come. Cookies became the de-facto state in the statelessness of HTTP. Today they are essential and their security is critical. Here is what you need to know.
The fundamentals Before getting into how cookies work let’s take a quick look at the basics.</description>
                <pubDate>Wed, 15 Mar 2017 21:40:59 +0000</pubDate>
                <link>https://www.securitydrops.com/cookies/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Same-origin policy</title>
                <link>https://www.securitydrops.com/same-origin-policy/</link>
                <description>When your browser opens a web page, it enforces various security rules. The most important one is the same-origin policy. It defines access rules for dynamic scripts and is considered to be the cornerstone of the web security model. The concept is rather old, it is from 1995 when Netscape Navigator 2 owned the streets of the web. Chances are, you two have already met during your development career, so no need for introductions.</description>
                <pubDate>Wed, 18 Jan 2017 22:42:00 +0000</pubDate>
                <link>https://www.securitydrops.com/same-origin-policy/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Open your browser</title>
                <link>https://www.securitydrops.com/open-your-browser/</link>
                <description>Today we live the era of the web and your browser is an integral part of it. As a developer, it is essential to know how stuff works to some degree, and understand how you might affect this behavior to increase security. This post is an intro to that topic!
Let’s start with a bit of context, shall we? First, let’s try to define what web browsers are!
They are applications used to render data; data that is fetched from a remote location.</description>
                <pubDate>Thu, 12 Jan 2017 22:33:00 +0000</pubDate>
                <link>https://www.securitydrops.com/open-your-browser/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Thinking like an attacker</title>
                <link>https://www.securitydrops.com/thinking-like-an-attacker/</link>
                <description>The best defense is a good offense! See things from your enemy’s point of view! It takes a thief to catch a thief! All great advice, however, it is a bit hard to utilize them without knowing the context in which they apply. The goal of this post is to provide that context. Who are the attackers? What are their goals? Where are they? That’s what we will cover!
Who is the attacker?</description>
                <pubDate>Wed, 04 Jan 2017 21:37:00 +0000</pubDate>
                <link>https://www.securitydrops.com/thinking-like-an-attacker/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>Defense in Depth a.k.a the Castle Approach</title>
                <link>https://www.securitydrops.com/defense-in-depth-a-k-a-the-castle-approach/</link>
                <description>Imagine you are back in middle school and your new science homework is The Egg Drop Project. For those of you not familiar with it, here is a brief description: your task is to design a protective structure for an egg. Once you finished, the egg will be placed in the shuttle you created and dropped from a certain height. The egg must survive the fall without harm! Here is a hint: defense in depth.</description>
                <pubDate>Sun, 01 Jan 2017 21:30:00 +0000</pubDate>
                <link>https://www.securitydrops.com/defense-in-depth-a-k-a-the-castle-approach/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>States of data</title>
                <link>https://www.securitydrops.com/states-of-data/</link>
                <description>Probably the most valuable thing you need to protect is data. You may own this data, or you may just be the custodian. It might be sensitive such as PII and credentials or just metadata you collected and organized. No matter its type and content when you think about its security here is what you need to keep in mind.
Data is kind of like water. Water is essential for life just as data is critical to the business.</description>
                <pubDate>Wed, 28 Dec 2016 21:40:00 +0000</pubDate>
                <link>https://www.securitydrops.com/states-of-data/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>How much security is enough?</title>
                <link>https://www.securitydrops.com/how-much-security-is-enough/</link>
                <description>As a security engineer, I regularly work with developers. Together we draft various ideas and try to find the best possible solution to the problem at hand. During this process, the following question always comes up in some form: how secure should this be? Simple as it may seem, usually a lot of thought goes into answering this. Let’s see why!
There are quite a few things in play here: legal and business requirements, the risk of exploitation, cost of mitigation, loss expectancy, business impact, etc.</description>
                <pubDate>Mon, 26 Dec 2016 21:28:00 +0000</pubDate>
                <link>https://www.securitydrops.com/how-much-security-is-enough/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
                                <item>
                <title>A guide to software engineers in the field of IT security</title>
                <link>https://www.securitydrops.com/a-guide-to-software-craftsmen-in-the-field-of-it-security/</link>
                <description>Hey, I am Daniel and my mission is to guide software engineers, like you, in the field of IT security. Think of me as a good friend, who has been here for a while and knows the clever little tricks you need to stay out of trouble. Security used to be a hobby of mine; now it is my passion, my craft. This blog is the collection of my thoughts and notes about IT security.</description>
                <pubDate>Mon, 19 Dec 2016 20:28:00 +0000</pubDate>
                <link>https://www.securitydrops.com/a-guide-to-software-craftsmen-in-the-field-of-it-security/</link><dc:creator>Daniel Szpisjak</dc:creator>                            </item>
            </channel>
</rss>
