Skip to content

Mark Satterfield

Strategist & advisor

  • Home
  • Articles
    • Articles
    • Articles – all articles in grid format
    • Articles – random carousel
  • About me
  • Contact

Tag: hacker

Exploiting the SDLC

Cyber Security hackers
Cyber Security hackers

Attacking software is really attacking the software development process. The adversary is looking to take advantage of software defects before those defects are repaired. This paper explores the attack timeline.

Published January 5, 2019
Categorized as Computer security Tagged cyber warfare, hacker, information warfare, software development

Writings by category

Tags

#privacy (2) 0day (1) 2019 (1) BCP (1) blog (1) business continuity (2) business continuity planning (2) business planning (2) call manager (1) cell phone (1) computer security (4) content filtering (1) default color (1) disaster recovery (1) DR (1) editing (1) featured image (1) google voice (1) hacking (1) identity (2) landline (1) mail (2) mail relay (2) oday (1) ohday (1) pbx (1) phish (2) phone (1) phone call (1) plugins (2) security (2) shading (1) social engineering (2) telephony (1) twenty nineteen (1) video (1) video log (1) vish (2) vishing (2) vlog (1) voip (1) vulnerability (2) windows (1) wordpress (5) zero day (1)

With no exceptions, all material on this site is presented for free, made available for educational purposes, with no warranties, no guarantees, no legal advice, and no technical advice.

  • Home
  • Articles
  • About me
  • Contact
Mark Satterfield
Proudly powered by WordPress.