To view or add a comment, sign in

More articles by Lindsay Morsillo

  • Greenfield development

    I looked up definitions for the phrase "Greenfield development" and one was "a strategy for creating a new system or…

  • A short story about trust

    With online communications and business we often take trust for granted. https://earnestengineer.

  • Authorization is still a coding problem...

    A common problem on the Common Weaknesses list is CWE-862: Missing Authorization. This happens when a product doesn't…

  • SMB Cyber Defense Fundamentals

    Cyber threats loom large, particularly for small and medium-sized businesses (SMBs) - they are prime targets, lacking…

    1 Comment
  • Resilience and Agility

    Building resilience into software systems means looking at “What-if” scenarios – a common aspect of risk management…

  • Code Reading and Interviewing

    Interviews for Software Engineers often focus on their ability to generate brand new code in a vacuum. How do they fare…

    2 Comments
  • Security is about the 'In-Betweens'

    Here's an obvious observation: The security of systems and software, as well as buildings, is about what is…

  • Designing for Security

    The anticipation has been excruciating, but the most recent Verizon Data Breach Investigations Report (DBIR) is finally…

  • Big Data Revolution in Healthcare

    This TedX talk by Dr. Joel Selanikio, which describes data collection techniques and methods used in global health…

    2 Comments

Explore content categories