ToddySMinDarkSkyTechAddressing the Current Challenges of Patching Container VulnerabilitiesWhile working on a process of improving the container secure supply chain, I often need to go over the current challenges of patching…7 min read·Aug 23, 2022----
ToddySMinDarkSkyTechSignatures, Key Management, and Trust in Software Supply Chains — Part 2: Exploiting SignaturesIn Part 1 of the series Signatures, Key Management, and Trust in Software Supply Chains, I wrote about the basic concepts of identities…9 min read·Feb 8, 2022----
ToddySMinDarkSkyTechSignatures, Key Management, and Trust in Software Supply Chains — Part 1: Identities, Signatures…For the past few months, I’ve been working on a project for a secure software supply chain, and one topic that seems to always start…13 min read·Jan 10, 2022----
ToddySMinDarkSkyTechWhy Multi-Factor Authentication (2FA/MFA) Usage Numbers Will Not Improve Any Time Soon?If you have missed the news lately, cybersecurity is one of the most discussed topics nowadays. From supply chain exploits to data leaks to…12 min read·Dec 13, 2021----