1. Threat Modeling: Designing for Security

    You've probably already heard the phrase "threat modeling" more than a few times. Threat modeling is a highly undervalued, often overlooked aspect of building secure applications---which is a shame, b…Read More

  2. Carve Systems Guest Author Program

    Carve Systems invites technical experts to contribute posts as a guest author on the Carve Systems blog. We want to create a useful technical blog that covers the very broad field of information secur…Read More

  3. Writing a Simple ESP8266-Based Sniffer

    In this series of blogposts we will cover advanced, security focused, aspects of the ESP8266 /ESP32 SoCs such as sniffing and injecting 802.11 and bluetooth packets, building proof-of-concept network …Read More

  4. Why Do I Write Vulnerable Code?

    You're a software engineer or architect. Imagine a security audit successfully exploited holes in the security of your system. Or worse, imagine the product was the victim of a data breach and receive…Read More

  5. Digital Security Strategy: Part 1

    At Carve we are fortunate to have clients that span across many industries, company sizes, and technology maturity levels. This series of blog posts will discuss an increasingly common theme across ou…Read More