<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">
Ken Malmquist

Ken Malmquist

Recent Posts By Ken Malmquist

Little Boxes | Vulnerability Assessment

Who remembers this song, written by Malvina Reynolds, and made famous by Pete Seegar (among others)? Little boxes on ...

Web Brutalism 2.0

Don’t become compromised via your third party code Have you heard about the new-old trend called “Web Brutalism”?

Devils of Abstraction

Your enemies think in three dimensions, and so should you. If you’re a Star Trek fan, and remember the 1982 movie, The ...

Spooky Tricks

Vault7 Shows the Government's Spy Kids Hard at Work In the late 1960s Rose Wyler, Gerald Ames, and Talivaldis Stubis ...

Depths of Defense

Is Your Application’s Defense Plan Really Battle Ready? Always have a backup plan. Sounds simple, right? You’d think ...

Brutal Hashes

AsTech Security Insights: Q3 Newsletter Introduction

Hello, good people. I bring you greetings from the AsTech Megaplex in beautiful San Francisco, California. Welcome to ...

What’s In a Name?

Sometimes you really do not know what you’re talking about I was thinking today about an interview I watched with the ...

Greeks and Geeks — Reflections on Computers, Philosophy, and

The AsTech Consulting blog space is usually focused on the importance of securing information with associated methods ...

When What You Know Just Ain’t So

To close out 2015, we're re-visiting some of our favorite articles from the year. We hope you enjoy it!

Pure Funky Magic

The Trouble with Software Engineering We’ve all experienced it. A piece of software or a website doesn’t act quite the ...

Trusted Sources — The Importance of Defense In Depth

I was walking through the supermarket today, trying to score something tasty for lunch, when I spotted in the drinks ...

Dancing with the Singularity

Are You Prepared for the AppSec Rapture? We were having a company meeting today about, of all things, this blog, when ...

When What You Know Just Ain’t So

Why Stored Procedures do not prevent SQL Injection The world recently marked the anniversary of a significant cinematic ...

Well Enough Left Not Alone—Security and Auditability

Well, here we are again, April 15th. If you happen to reside in the United States, that date will have special ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments