Overview This lab explored common weaknesses in authentication mechanisms, focusing on how small implementation details — particularly error messages and token generation — can introduce real security risks. Rather than relying on complex exploitation, the...
Latest Posts
Introducing the Security Bookshelf
I’m starting a new series on my blog: the Security Bookshelf. The idea is simple — to read one security-themed book each month and write about it here.
Why I'm Going to CyberUK 2026
This year I decided to attend CYBERUK, the UK’s flagship cybersecurity conference organised by the National Cyber Security Centre. This will be the first time I’ve attended CyberUK – in fact, the first cybersecurity conference...
Welcome to JaneDoesSecurity
Hello, and welcome to my corner of the internet. I’m Jane — a cybersecurity professional who recently earned the CISSP and is now working towards the CCSP. I started this blog because I wanted a...