<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Dominik Muhs</title>
        <link>https://paragraph.com/@lethalspoons</link>
        <description>Sr. Security Engineer working with Ethereum smart contracts. Working in Creed, prev. ConsenSys Diligence, Alethio.</description>
        <lastBuildDate>Fri, 17 Apr 2026 10:25:57 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Dominik Muhs</title>
            <url>https://storage.googleapis.com/papyrus_images/67f01d3a1bb54b4b48dcbb5181816eaae30abb767058650057c68fffc56619f0.jpg</url>
            <link>https://paragraph.com/@lethalspoons</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Why You Should Care About Risk Assessments]]></title>
            <link>https://paragraph.com/@lethalspoons/why-you-should-care-about-risk-assessments</link>
            <guid>8ZBLsV1tAKvaLKTuJtav</guid>
            <pubDate>Fri, 18 Jul 2025 12:05:07 GMT</pubDate>
            <description><![CDATA[In cybersecurity, there’s no such thing as "too secure." With the growing sophistication of threat actors, particularly in relation to smart contract systems, it’s essential to stay ahead of the curve. That’s where risk assessments come into play. But why, exactly, should they matter to you?What is a Risk Assessment?A risk assessment is essentially a process to identify where your organization’s cybersecurity weaknesses lie and how those weaknesses could impact your operations. The goal is to...]]></description>
            <content:encoded><![CDATA[<p>In cybersecurity, there’s no such thing as &quot;too secure.&quot; With the growing sophistication of threat actors, particularly in relation to smart contract systems, it’s essential to stay ahead of the curve. That’s where risk assessments come into play. But why, exactly, should they matter to you?</p><h2 id="h-what-is-a-risk-assessment" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What is a Risk Assessment?</strong></h2><p>A risk assessment is essentially a process to identify where your organization’s cybersecurity weaknesses lie and how those weaknesses could impact your operations. The goal is to provide a clear picture of the risks you’re facing and help prioritize what needs attention. It’s about understanding the big picture, not just checking off technical tasks like code reviews or penetration tests.</p><p>At Creed, we take this process seriously. Our risk assessments don’t just focus on one part of your system. We evaluate everything from your security policies to your ability to recover from an incident. It’s about being prepared for whatever may come your way.</p><h2 id="h-how-risk-assessments-complement-code-reviews-and-penetration-tests" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How Risk Assessments Complement Code Reviews and Penetration Tests</strong></h2><p>You’ve probably heard of code reviews and penetration tests. They’re all about finding specific weaknesses in your smart contract code or your system. These are crucial steps in any security process, but they don’t paint the whole picture.</p><p>That’s where a risk assessment comes in. While code reviews and penetration tests highlight vulnerabilities in your code or infrastructure, a risk assessment examines how these risks align with your broader security framework. For example, a smart contract audit may identify a critical flaw in your code, but a risk assessment will evaluate how this issue impacts your overall security strategy. It digs deeper to ask questions such as:</p><ul><li><p>Are your policies and procedures current?</p></li><li><p>Do your teams communicate effectively about cybersecurity risks?</p></li><li><p>How prepared are you to respond to a breach, and who is responsible?</p></li></ul><p>In short, a risk assessment takes a more holistic approach. It helps you see beyond just fixing individual vulnerabilities and guides you on how to manage risk across the entire organization.</p><h2 id="h-the-goal-identifying-and-managing-risk" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Goal: Identifying and Managing Risk</strong></h2><p>At Creed, we use a structured process to assess your organization’s risks. This process involves six key areas:</p><ol><li><p><strong>Governance:</strong> We check whether you have clear cybersecurity policies, defined roles, and a strong security strategy.</p></li><li><p><strong>Identification:</strong> We help you inventory your critical assets (data, systems, and services) and understand the associated risks.</p></li><li><p><strong>Protection:</strong> We assess your safeguards (such as access control and data protection) to ensure they’re effective.</p></li><li><p><strong>Detection:</strong> We assess how effectively you monitor for threats and vulnerabilities.</p></li><li><p><strong>Response:</strong> We review your incident response plan to ensure you’re prepared to act quickly in the event of an issue.</p></li><li><p><strong>Recovery:</strong> We assess how quickly you can return to normal after a security incident.</p></li></ol><p>These areas aren’t isolated: they all work together to make sure your organization is resilient and ready to handle any cybersecurity challenge. Rather than just reacting to incidents, a risk assessment helps you proactively manage potential risks before they become a problem.</p><h2 id="h-why-you-need-a-risk-assessment-now" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why You Need a Risk Assessment Now</strong></h2><p>Threats are constantly evolving, and it’s easy to miss a few things when you’re only looking at one piece of the puzzle. A risk assessment provides a comprehensive view of your organization’s cybersecurity landscape. It helps you identify potential vulnerabilities in your strategy, governance, and even your supply chain: Things you might miss with just a code review or penetration test.</p><p>For projects heavily relying on smart contracts, the stakes are even higher. A vulnerability in your code could result in a significant loss, and it’s not always obvious where the risks are coming from. By performing a risk assessment before the next round of code reviews, you can guide your security partners more effectively and ensure that all the bases are covered.</p><h2 id="h-lets-talk-about-your-security" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Let’s Talk About Your Security</strong></h2><p>At Creed, we don’t just conduct risk assessments – we work with you to make sure your security strategy aligns with your goals. Our process is thorough, actionable, and designed to give you the insights you need to stay ahead of potential threats. If you&apos;re ready to have a more proactive approach towards your projects’ security, we’d love to help.  Take the Creed and make the first move towards strengthening your organization’s security framework today.</p>]]></content:encoded>
            <author>lethalspoons@newsletter.paragraph.com (Dominik Muhs)</author>
        </item>
    </channel>
</rss>