The “Security by” Model Approach — Part 2: Meet the Cousins

If you thought “Security by Obscurity”, “Security by Isolation”, and “Security by Default” were the only models crashing the cybersecurity party… think again.

Turns out, the “Security by” (first uncovered in Part 1 of this series) family tree has a few more colorful cousins, the kind that only show up late to the party, wearing niche distro hoodies and carrying encrypted USB drives. They may not be household names like SaaS or PaaS (and they certainly don’t rhyme), but trust me, they bring their own brand of weird… and sometimes wonderful security vibes.

These models don’t always follow industry buzzwords. They aren’t trending on Hacker News. But behind the scenes, they’ve helped protect sensitive systems, dodge mass attacks, and keep threats guessing. They’re the oddballs, the security underdogs but don’t mistake them for weak links.

So, grab your cyber-coffee, log out of root, update your threat model… and let’s meet the next batch of “Security by” models.

Read more

The ‘Security by’ model approach

Passionate about it! Intrigued by it! Confused by it! SaaS, RaaS, XaaS, what! what!, okay let me PaaS, oops meant pass! Unlike the as-aservice model that inherently loves prepending strange InfoTech words, I am going to talk about another model, that seems to enjoy appending weird random like words; the ‘Security by’ model! Don’t you just love it? Oops, I meant I.T! Security by Obscurity, Security by Isolation, Security by Default!; The ‘Security by‘ model approach!

 

 

The ‘Security by’ model approach seems to share and rely on; 

Read more