Skip to content

Avoiding the Security Black Hole with Non-Functional Requirements

  • Adrian Reed 
  • 2 min read
Image of a man walking a tightrope in a circular blackhole

I’m pleased to say that one of my recent blog articles has been published on “”, where I have contributed as a guest author. I’d love to hear what you think, so please take a look and add a comment on the site.

A short excerpt is shown below.


Image of a man walking a tightrope in a circular blackhole
Avoid the black hole…

As an avid Skype user, I couldn’t believe it when I read that Microsoft (Skype’s new owner) temporarily suspended the software’s password reset function to avoid falling foul of an alleged security vulnerability. I immediately felt at risk. How could such a useful and ubiquitous service, and one that I use every day, be vulnerable to such a seemingly simple shortcoming?

Of course, security vulnerabilities aren’t limited to Skype. I’m sure we’ve all heard the stories and read news articles about security hazards in the software and hardware we use every day. What is equally worrying is that there appears to be an emerging marketplace where details of security vulnerabilities are disclosed for cold, hard cash…


Read the rest of the article by clicking below:


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.