A picture of a coastal landscape, blurry except for through a camera lens held up in the middle of the image.

Different Kinds of Cybersecurity

In the world of cybersecurity there is a lot of specific definitions, a type of insider lingo that we assume that everyone agrees on the definition of. However, herein lies the problem. We assume, without discussing. I have ended up in multiple discussions that occurs due to different interpretations of a definition. In this post I’ll give my view of one of the biggest differences of definition that I have seen, namely what we include in the term cybersecurity....

August 27, 2023 · 4 min · Oskar Edbro
A mysterious hooded person on a busy night street lit by mostly pink neon signs.

Threat Modelling and Threat Actors

As security professionals working with software components it is not always easy to prioritise what security raising actions should be prioritised. According to most security standards (such as ISO27000) require a risk based security approach. Regardless if we are building our own applications, or we are installing third party software in our network we need to understand what threats there are to our environment. After understanding what threats there are, we prioritise them and thereby also prioritise what actions we should take to minimise the risk....

July 2, 2023 · 3 min · Oskar Edbro
A businessman playing chess

Vulnerability Categories for Business

There are endless ways to divide vulnerabilities into different classifications. Each more granular than the other. However, there is also a need to for a simple divide, targeted to the business. That is the problem this post will solve. By using the same categories as in the post Security for Any Development Team I will break down security vulnerabilities into three categories. After reading this post, you will get an insight into why vulnerabilities may arise, and what can be done to minimise the risk....

November 5, 2022 · 5 min · Oskar Edbro

Learning (Security) by Communication

Anyone working in Cybersecurity can tell you that there are endless fields of specialisation. For example, helping R&D through AppSec, hacking companies through red-teaming, or responding to incidents in a CyberSecurity Incident Response Team (CSIRT). Regardless of speciality, there are skills you will have mastered, and ones you haven’t. In addition to the skills there are knowledge, ways of working etc. connected to each field. We as cybersecurity professionals need to be better at leveraging this diversity of skills and knowledge to our advantage....

July 25, 2022 · 4 min · Oskar Edbro

An Overview of Security Champions

Security Champions is a concept that gets more and more attraction. The function might go under another name, such as Security Masters, but the concepts are the same. In this post I will dig into what this role contains and how it can be applied to improve the security posture of an organisation. My experience with Security Champions is in Research and Development organisations, so my views are anchored in RnD....

June 19, 2022 · 5 min · Oskar Edbro