-
Putting the “crypt” in “crypto-Catholic.”
-
A collaborative and informal way to develop “misuse cases” and perform threat modeling.
-
How to think like a hacker–including leveraging social networking to get into your target.
Still going after all these years.