Skip to content
March 22, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • 2026
  • Page 2

Year: 2026

  • Certification
2 months ago2 months ago

CSSLP: A Journey of Relearning How Security Should Be Built

When I saw the “Pass” result for the CSSLP exam, my first reaction wasn’t excitement. It was relief. And then — clarity. CSSLP wasn’t just another certification to add to my profile. It was a mirror held up to my career, forcing me to confront how often security is treated as an afterthought, a patch,…

Read More
Shekhar Suman11 mins
  • 1
  • 2

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • OT Security
  • Secure SDLC
  • Web Security

Recent Posts

  • AI Is Flooding Open Source — And Most of It Won’t Survive (2026)
  • CVE-to-OT Impact Translator – COIT
  • LANCE: An Open Source Framework for Automated Red Teaming of LLMs (2025)
  • Jailbreaking vs. Prompt Injection: Same Problem, Different Names — Or Is It?
  • End-to-End LLM Security Architecture: How All the Defenses Fit Together

Recent Comments

  1. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  2. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  3. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  4. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  5. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough

Archives

  • March 2026
  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.