Security news that informs and inspires
headshot of Fahmida Y. Rashid with teal overlay

Fahmida Y. Rashid

Contributor

Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.

  • fahmida@decipher.sc
  • @FYRashid
  • 3DF6 3FDA FACC 7BC6
352 articles by Fahmida Y. Rashid

No Easy Fix for BGP Leaks

We forget that the Internet is pretty fragile and when something breaks, there is collateral damage. DNS hijacking and BGP leaks are two of the problems we haven't fixed yet, and there aren't any easy solutions.

Internet, Networking

Manage Third-Party Suppliers with Personality Tests

Every supplier and third party vendor has different behaviors, abilities and knowledge. Developing a personality profile for each supplier can help organizations decide how much effort they need to spend managing that relationship as part of an effective infosec and privacy assurance program.

China, CISO

Hacker History: How Dan Kaminsky Almost Broke the Internet

In this illustrated Hacker History video, security researcher Dan Kaminsky goes back to 2008 and describes how he found the vulnerability in DNS and almost broke the Internet. Unfortunately, DNS still needs to be fixed.

Hacker History, DNS Security, Network Security

LinkedIn CISO: Bringing Diversity into Security with the Stories We Tell

Everyone has their own story about who they are and what they do. LinkedIn CISO Cory Scott describes how to use people's personal narratives to put together security teams that have a diverse set of skills, problem-solving, and experiences.

CISO

Web Application Bugs, From Disclosure to Exploit

Just because a vulnerability exists doesn’t automatically mean it will get exploited. It turns out the popularity of the software matters, but so does where the vulnerability information is published.

Web App Security, Web App Attacks