About Security Autopsy

About Security Autopsy

A human-centric approach to implement security programs and processes within organizations.

This blog is a way to share my experience and knowledge of working on both side of the fence:

  • Red Team and Blue Team
  • IC and Manager
  • Startups and Fortune 200 companies
  • Consultant and internal employee

These pages explain my experience gain in all those past jobs and what are the best ways to implement security programs and its processes, from a high level perspective to a technical one.

Will talk about the following programs:

  • Application Security
  • Cloud Security
  • Product Security
  • Red Team
  • Purple Team
  • Bug Bounty
  • External and Internal Pentest
  • Fraud Emulation
  • And more!

Access all areas

By signing up, you'll get access to the full archive of everything that's been published before and everything that's still to come. Your very own private library.

Fresh content, delivered

Stay up to date with new content sent straight to your inbox! No more worrying about whether you missed something because of a pesky algorithm or news feed.

Meet people like you

Join a community of other subscribers who share the same interests.