Robert LagerströminLevel Up CodingA flexible open-source attack simulation frameworkThreat modeling is becoming more and more common for both application development and system analysis. However, most threat modeling…5 min read·Jun 22, 2021----
Robert LagerströmThe Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?Verizon estimates that 90% of all data breaches originate from phishing.4 min read·May 3, 2021----