Common Points

2025/01/27

Common Points I’ve Spoken or Written About

This document catalogs the most frequently discussed topics, themes, and insights from my talks, interviews, and writings across all timeline files. Each point includes frequency indicators showing how often it’s been mentioned, along with supporting quotes from different sources.

Introduction

Over the years, I’ve spoken at numerous conferences, participated in panels, and given interviews on various aspects of information security. This document attempts to capture the recurring themes and common points that emerge across these discussions. The analysis is based on 28 files with AI-generated summaries, transcripts, and other timeline content.


1. Career & Professional Development

1.1 Field Evolution: From Hobby to Profession (Mentioned in 2 talks/interviews)

The information security field has fundamentally transformed from a hobby-driven community to a professional career option.

Quotes:

Context: This evolution is discussed across multiple interviews and talks, particularly when explaining how the industry has changed over the past 15+ years.

Evolution: The field continues to mature, but still lacks a defined learning path like MBBS for doctors. The industry is still figuring out structured learning methodologies.

Discussed in:


1.2 Certifications: Value and Limitations (Mentioned in 3 talks/interviews)

Certifications have value but should not be the primary hiring criterion. Organizations should find good people and pay them to get certifications, not hunt for certified people.

Quotes:

Context: This is a recurring theme, especially in career guidance sessions and discussions about hiring practices.

Evolution: The perspective has evolved from “certifications are essential” to “certifications are useful for keywords/barriers, but skills matter more.”

Discussed in:


1.3 Essential Skills: Patience, Reading, Troubleshooting (Mentioned in 3 talks/interviews)

Core skills for aspiring cybersecurity professionals include patience to read extensively and patience to troubleshoot, along with understanding underlying processes. Troubleshooting isn’t just a bonus skill - it’s survival.

Quotes:

Context: Frequently mentioned in career guidance sessions and training discussions. The troubleshooting blog post emphasizes that in a world of abstractions and automation, the ability to dig into problems remains critical.

Discussed in:


1.4 Mentorship: Don’t Idolize, Ask Questions (Mentioned in 2 talks/interviews)

Don’t idolize people - ask questions when stuck. Do homework first, then ask specific questions. Mentors remove roadblocks, don’t walk the path for you.

Quotes:

Context: Discussed in career guidance, training sessions, and mentorship testimonials.

Discussed in:


1.5 Building Unique Profile: Leverage Past Experiences (Mentioned in 1 talk/interview)

If everyone learns from same resources, everyone is at same level. What makes you unique? Leverage past experiences. Document everything.

Quotes:

Context: Career advice sessions, especially for students and entry-level professionals.


1.6 From SPOF to Linchpin: Growth Without Getting Stuck (Mentioned in 1 blog post)

If you want to grow, at some point you must become a Single Point of Failure (SPOF) - but you cannot stagnate there. The goal is to be a serial SPOF, solving bigger problems each time, then documenting, automating, and training others before moving on.

Quotes:

Context: Discussed in blog posts about career growth and leadership. The healthier arc: Jump into chaos β†’ Solve problems β†’ Take ownership β†’ Become SPOF temporarily β†’ Document ruthlessly β†’ Automate β†’ Train others β†’ Exit gracefully β†’ Repeat.


1.8 Why Learning to Code Matters More in the Age of AI (Mentioned in 1 blog post)

As AI handles more of the grunt work, it becomes more critical to understand the core logic yourself. Learning to code isn’t about typing faster - it’s about testing assumptions, building small proofs, and keeping your context engine awake.

Quotes:

Context: Discussed in blog posts about AI’s role in software development and the importance of maintaining core skills.


1.9 Entry Paths: Multiple Routes into Cybersecurity (Mentioned in 3 talks/interviews)

There are multiple pathways into cybersecurity - from sysadmin background, directly from college, through CTF events, bug bounties, or Google Summer of Code.

Quotes:

Context: Career guidance discussions across multiple interviews and panels.

Discussed in:


2. Supply Chain Security

2.1 SBOM is Inventory, Not Security Solution (Mentioned in 3 talks/interviews)

SBOM is fundamentally an inventory, not a security solution itself. Its use in security is just one application. Don’t treat SBOM as a security solution.

Quotes:

Context: Discussed extensively in supply chain security talks and SBOM-focused interviews.

Evolution: Initially SBOM was touted as a silver bullet, but the narrative has shifted to “SBOM is the starting point, not the solution.”

Discussed in:


2.2 80% of Code is Import Statements (Mentioned in 4 talks/interviews)

About 80% of software products are import statements - you’re importing 100% of library code to use 10% of functionality.

Quotes:

Context: Used to explain why supply chain security matters - most code isn’t written by you.

Discussed in:


2.3 Supply Chain Beyond Code Dependencies (Mentioned in 3 talks/interviews)

Supply chain security includes more than just code dependencies - it includes developer environments, IDE extensions, CI/CD systems, containers, AI agents, and more.

Quotes:

Context: Discussed in supply chain security talks, especially recent ones focusing on what SBOMs miss.

Discussed in:


2.4 Centralized Dependency Management (Mentioned in 1 talk/interview)

Security teams should provide vetted, audited library “battery packs” to developers. SBOMs can help identify commonly used libraries across an organization.

Quotes:

Context: Discussed in supply chain security talks as a practical approach to managing dependencies.


3. DevSecOps & Security Culture

3.1 DevSecOps Should Never Have Existed (Mentioned in 2 talks/interviews)

DevSecOps is a term that should never have existed. DevOps should be secure by default. The term came up because security wants their share.

Quotes:

Context: Discussed in DevSecOps talks and interviews, often as an opening statement.

Discussed in:


3.2 Security as Science, Not Art (Mentioned in 2 talks/interviews)

Security professionals consider security as art, not science. Developers should commoditize security, convert it into science - make it automatable, documentable, testable, repeatable.

Quotes:

Context: Core message in developer security talks and DevSecOps discussions.

Evolution: This has been a consistent theme - the need to move from art to science to enable measurement and automation.

Discussed in:


3.3 Offensive Problems are Technical, Defensive Problems are Political (Mentioned in 2 talks/interviews)

Halvar Flake’s quote: “The offensive problems are technical in nature, the defensive problems are political in nature.”

Quotes:

Context: Referenced in multiple talks about the challenges of defensive security and why offense is easier to measure.

Discussed in:


3.4 Shift Left is Unavoidable (Mentioned in 1 talk/interview)

With rapid release cycles (40-50 deployments per day), shift left approach is good and unavoidable. Everything has to happen within very short time.

Quotes:

Context: Discussed in DevSecOps panels and shift left strategy talks.


3.5 De-risk Individuals, Focus on Collective Responsibility (Mentioned in 1 talk/interview)

Major problem is culture. Focus on de-risking individuals, focus on collective responsibility. If hack happens, it’s collective responsibility, not one person’s fault.

Quotes:

Context: Discussed in panels about organizational security culture and CISO challenges.


4. Android & Mobile Security

4.1 Mobile is Fully Hostile Territory (Mentioned in 2 talks/interviews)

Mobile is “fully hostile territory” - device may be hacked, owner may be hostile. Can’t trust user running app, app running in secure environment, headers from server.

Quotes:

Context: Core principle discussed in Android security talks and mobile security panels.

Discussed in:


4.2 Defense in Depth for Mobile (Mentioned in 1 talk/interview)

Mobile security requires defense in depth approach - SSL pinning β†’ Request signing β†’ Validation layers. Each layer raises attacker skill requirement.

Quotes:

Context: Discussed in mobile security talks and Android security training sessions.


4.3 Mobile Security Model: Low-Privileged by Default (Mentioned in 2 talks/interviews)

By default, applications run as low-level privileged user (non-admin mode). Mobile devices do this by default - recommendation on Windows is to use non-administrative user.

Quotes:

Context: Discussed in mobile security talks and Android security presentations.

Discussed in:


5. Open Source & Community

5.1 Open Source Philosophy: Do It Because You Want To (Mentioned in 2 talks/interviews)

Don’t do open source expecting returns - do it because you want to. Open source is “medium of expression” - I did something, I want to share it.

Quotes:

Context: Discussed in multiple interviews when talking about open source projects like Android Tamer, Code Vigilant, and Hacking Archives of India.

Evolution: Earlier open source was simple sharing. Now it’s become a mechanism to game the system for job opportunities, but the core philosophy remains.

Discussed in:


5.2 Code Vigilant: Learning Code Review (Mentioned in 2 talks/interviews)

Code Vigilant started around 2014 when frustrated with code review at work, wanted to learn. Picked WordPress as target, did code review, wrote automation, found bugs, disclosed them.

Quotes:

Context: Discussed when talking about open source projects and learning approaches.

Discussed in:


5.3 Android Tamer/Tamer Platform: Unified Environment (Mentioned in 2 talks/interviews)

Android Tamer started 2011 - unified environment for Android security tools. Problem: Tools fragmented across different languages/versions. Solution: Cohesive environment where all tools coexist.

Quotes:

Context: Discussed in Android security talks and when explaining project origins.

Discussed in:


5.4 Community Involvement: Show Up and Make Presence Felt (Mentioned in 1 talk/interview)

Communities provide collaborative learning and crystallized/distilled information. Important to “show up and make your presence felt” - not just be part of 200-500 people crowd.

Quotes:

Context: Discussed in career guidance sessions and community-focused talks.


6. Security Research & Methodology

6.1 Hacker vs Adversary: Understanding the Difference (Mentioned in 1 blog post)

Most infosec advice says “think like a hacker,” but infosec fights adversaries with goals, not curiosity. Real defense means blending hacker creativity with adversary realism.

Quotes:

Context: Discussed in blog posts about security research methodology and threat modeling.


6.2 Look at What People Are Not Focusing On (Mentioned in 1 talk/interview)

Way to do quality research: Look at something which no one else is looking at, go big. James Kettle example - looking at HTTP headers, not even reached HTTP body yet.

Quotes:

Context: Discussed in research methodology talks and career guidance for researchers.


6.3 Research More Difficult Now Due to Overabundance (Mentioned in 1 talk/interview)

Research now more difficult because there is more vs content than actual content needed. Not BS content - people writing BS content to gain popularity.

Quotes:

Context: Discussed in panels about security research evolution.


7.1 Security Then vs Now: Fun to Commercial (Mentioned in 1 talk/interview)

2000-2010: Hacking was fun, people doing it because it was exciting. 2010-2022: Established job opportunity, commercial enterprise, nine-to-five for many.

Quotes:

Context: Discussed in panels comparing security practices from past to present.


7.2 Industry Does Bare Minimum (Mentioned in 3 talks/interviews)

IT industry does what is bare minimum necessary to get by. If requirement is 80.0000, will not do 80.0001 - just do bare minimum required. We’ve learned to game systems - optimizing for metrics rather than meaning.

Quotes:

Context: Discussed in supply chain security talks, industry critique sessions, and blog posts about systemic issues.

Discussed in:


7.3 Attack Surface Keeps Increasing (Mentioned in 1 talk/interview)

Attack surface keeps on increasing. Resources deployed to help with that keeps on decreasing. More attack surface you have, more vulnerable you are.

Quotes:

Context: Discussed in talks about security challenges and industry problems.


8. Training & Education

8.1 Prerequisites are Crucial (Mentioned in 1 talk/interview)

Prerequisites are crucial for trainings. Very common prerequisite: Person should be well versed or at least hands-on with command prompt. If have to teach how to open command prompt, then not target audience.

Quotes:

Context: Discussed in training methodology talks and when explaining training approaches.


8.2 Support Ratio: 15 People Max Per Support Trainer (Mentioned in 1 talk/interview)

Set up ratio - take 15 people at max associated with one support trainer. If teaching class of say 30 people, would have on stage and one more person available.

Quotes:

Context: Discussed in training methodology talks, especially about online training transitions.


8.3 Full Days Better Than 4 Hours/Day for Online Trainings (Mentioned in 1 talk/interview)

Biggest challenge moving online: Companies wanted 4 hours/day instead of full days. Did couple of runs and basically put foot down - “Nope not doing” because employee is only four hours on training, remaining four hours supposed to work.

Quotes:

Context: Discussed in training methodology talks about online training challenges.


9. Philosophy & Principles

9.1 Don’t Idolize People (Mentioned in 2 talks/interviews)

Don’t idolize people - everyone has own journey and own life, everyone working towards own goals. Don’t try to just idolize someone. This principle is closely related to mentorship (see section 1.4).

Quotes:

Context: Core principle mentioned in career guidance, training sessions, and mentorship discussions. See also section 1.4 for related mentorship discussion.

Discussed in:


9.2 It’s Okay to Say “I Don’t Know” (Mentioned in 2 talks/interviews)

Be open in saying “I don’t know” - but then go back and figure out what you don’t know. What’s not okay is still saying you don’t know after 6 months.

Quotes:

Context: Discussed in training methodology talks and career guidance sessions.

Discussed in:


9.3 Defense is Hard, Attack is Easy (Mentioned in 1 talk/interview)

Defense is hard, attack is easy. This controversial statement but true. Started looking at “Okay what are options? What are possibilities getting into infosec space?”

Quotes:

Context: Discussed when explaining journey from defense to offense to purple teaming.


9.4 Under Commit, Overperform (Mentioned in 2 talks/interviews)

The hack - under commit, overperform. If able to do 100 things, claim that able to do 70. Even if finish 80 of them, have overperformed.

Quotes:

Context: Discussed in entrepreneurship interviews and career advice sessions.

Discussed in:


9.5 Your Mileage Will Most Definitely Vary (Mentioned in 2 talks/interviews)

Use it for any number of things - for DevSecOps pipelines, to software supply chain equations, to entrepreneur journey. Every single person starting in that journey would have different journeys.

Quotes:

Context: Used as a disclaimer/caveat in multiple talks about implementation approaches.

Discussed in:


10. Tools & Technologies

10.1 OSQuery for Software Asset Inventory (Mentioned in 2 talks/interviews)

OSQuery is highly recommended for enterprise-wide software inventory and querying. During Log4j crisis, organizations with OSQuery could quickly query for log4j installations.

Quotes:

Context: Discussed in supply chain security talks and software asset inventory discussions.

Discussed in:


10.2 Semgrep for Code Pattern Analysis (Mentioned in 2 talks/interviews)

Semgrep can identify if vulnerable functions are actually called. Use Semgrep to identify if vulnerable function is actually called - helps prioritize vulnerabilities.

Quotes:

Context: Discussed in supply chain security talks and code review discussions.

Discussed in:


10.3 Why Boring Tools Keep Us Productive (Mentioned in 1 blog post)

Production isn’t a scale - it’s a promise. Boring tools don’t promise the moon, they just promise they’ll run - and they do. Old tech eventually went stable; new tech just moves the goalpost every few weeks.

Quotes:

Context: Discussed in blog posts about tool selection, stability, and the value of proven technologies over constantly changing new ones.


10.4 Making Security Tools Accessible: Browser-Native Tools (Mentioned in 1 blog post)

Security tooling today is often overcomplicated and infrastructure-heavy. Browser-native, client-side tools can be minimalist, secure, and surprisingly powerful - just open index.html and go. No servers, tracking, or setup required.

Quotes:

Context: Discussed in blog posts about tool development philosophy and accessibility.


10.5 GitHub Student Pack and Free Resources (Mentioned in 2 talks/interviews)

GitHub Student Pack includes GitHub Pro, free domains, compute resources from Digital Ocean/Linode. Use free compute resources to build websites, understand deployment processes.

Quotes:

Context: Discussed in career guidance sessions and learning resource recommendations.

Discussed in:


11. Industry Perspectives & Debates

11.1 How Infosec Can Learn from Healthcare and Aviation (Mentioned in 1 blog post)

Infosec can learn from healthcare and aviation industries - adopting checklists, thorough documentation, fixed working hours, and proper handovers. The sector is grappling with staff shortage and disorganized handovers, leading to preventable complications.

Quotes:

Context: Discussed in blog posts about improving infosec operations through structured approaches from other industries.


11.2 Determinism vs. Non-Determinism: Choosing the Right Tool (Mentioned in 1 blog post)

Determinism builds trust, non-determinism builds discovery. The art lies in knowing when the world needs certainty - and when it needs the unexpected gift of surprise. Not every nail needs a non-deterministic hammer.

Quotes:

Context: Discussed in blog posts about problem-solving approaches, LLMs, and when to use deterministic vs. non-deterministic solutions.


11.3 Reflections on Code and Control (Mentioned in 1 blog post)

Building philosophy: I build because I need to, not for applause. I value decentralization because it’s where control lives. When everything is centralized, all we have are dashboards. When something breaks, we don’t fix - we escalate.

Quotes:

Context: Discussed in blog posts about building philosophy, decentralization, and taking responsibility.


12. Industry Perspectives & Debates

12.1 Community vs Industry (Mentioned in 1 talk/interview)

Need both passionate people and people just doing the job. Should not be hostile to people just doing the job - need both to grow industry.

Quotes:

Context: Discussed in panels about industry growth and community dynamics.


12.2 Generalist vs Specialist (Mentioned in 1 talk/interview)

Generalists needed more than ever - to glue specialists together strategically. Much needed: Having deep generalists in key positions now is much needed.

Quotes:

Context: Discussed in panels about career paths and industry needs.


12.3 Centralization vs Decentralization (Mentioned in 2 talks/interviews)

Internet began decentralized, economic models forced centralization. Hope for decentralization - Mastodon example shows it can work when right moment comes.

Quotes:

Context: Discussed in panels about internet architecture and future of technology, and blog posts about building philosophy and control.

Discussed in:


Conclusion

These common points represent recurring themes across years of speaking, writing, and contributing to the information security community. They reflect both the evolution of the industry and consistent principles that have guided my approach to security, career development, and community involvement.

The frequency indicators show which topics have been most consistently discussed, while the quotes provide direct evidence of how these points have been expressed across different contexts and time periods.