Cybersecurity Index ​
A comprehensive collection of security research, frameworks, and methodologies developed over two decades in information security, covering assessment types, threat modeling, web application security, and the evolving security landscape.
Core Security Architecture
Information Security Definitions
Authoritative taxonomy of security terminology and operational definitions
Information Security
Comprehensive field analysis: attack/defense dynamics, career paths, and operational requirements
Threats, Vulnerabilities, and Risks
Formal classification system for security primitives
Secrecy (Obscurity) is a Valid Security Layer
Empirical analysis of obscurity as legitimate security control when properly implemented
Efficient Security Principle (ESP)
Game-theoretic model explaining persistent low security baselines through economic incentives
We Can’t Really Affect AI Security
Application of ESP to AI security adoption dynamics
Assessment Methodologies
Information Security Assessment Types
Comprehensive taxonomy: vulnerability assessments, penetration tests, red teams, audits, threat modeling
Vulnerability Assessment vs. Penetration Test
Goal-oriented vs. list-oriented security testing methodologies
When to Use Different Assessment Types
Decision framework for assessment type selection
Red, Blue, and Purple Teams
Team structures, operational roles, and interaction patterns
Events, Alerts, and Incidents
SOC terminology and operational classification
Threat Modeling Systems
Password vs. TouchID vs. FaceID Threat Model
Quantitative threat modeling for authentication methods
Threat Modeling Against Apple’s TouchID
Biometric authentication vulnerability analysis
Password Reset Mechanisms
Account recovery vulnerability assessment
ATHI — AI Threat Modeling Framework
Structured framework: Actor, Technique, Harm, Impact analysis
The AI Attack Surface Map v1.0
Comprehensive AI system vulnerability taxonomy
Web Application Security
How to Explain SQL Injection to Anyone
Pedagogical approach to SQL injection mechanics
Standard vs. Blind SQL Injection
Comparative analysis of injection techniques
SQL Injection is 90% SQL
Skill requirement analysis for web security
CSRF vs. Clickjacking
Attack vector classification and prevention
CSRF is Wicked
Cross-site request forgery exploitation patterns
The Sleepy Puppy XSS Framework
XSS payload orchestration system
IoT + SSRF: A New Attack Vector?
Server-side request forgery in IoT environments
Same Origin Policy
Browser security model fundamentals
Security Tools & Automation
A ffuf Primer
High-performance web fuzzing methodology
Burp Intruder Payload Methods
Advanced payload generation techniques
Testing HSTS-protected Sites
HSTS bypass methodologies
amass — Attack Surface Mapping
Comprehensive reconnaissance automation
Masscan Examples
High-speed port scanning techniques
A tcpdump Tutorial
Packet capture and analysis fundamentals
The Nmap / DShield Trick
Advanced reconnaissance methodology
10 Essential Firefox Plugins for InfoSec
Browser-based security testing toolkit
Infrastructure Security
Firewalls
Firewall architecture and implementation patterns
DMZ
Demilitarized zone design principles
How Network Ports Work
Port security fundamentals
Building an IDS with Suricata
Intrusion detection implementation
AI Security Integration
ML in Cyber Attack and Defense
ML application patterns in security operations
Will AI Help Attackers or Defenders?
Asymmetric advantage analysis
AI Security Operation Centers
SOC automation architecture
Industry Analysis
The Cybersecurity Hiring Gap
Labor market structural analysis
Cybersecurity Risk Scores
Security rating service critique
Build a Successful InfoSec Career
Career trajectory optimization strategies
Day 1 Skills for Entry-level Jobs
Skill requirement analysis
InfoSec Interview Questions
Technical interview preparation framework
