If you thought “Security by Obscurity”, “Security by Isolation”, and “Security by Default” were the only models crashing the cybersecurity party… think again.
Turns out, the “Security by” (first uncovered in Part 1 of this series) family tree has a few more colorful cousins, the kind that only show up late to the party, wearing niche distro hoodies and carrying encrypted USB drives. They may not be household names like SaaS or PaaS (and they certainly don’t rhyme), but trust me, they bring their own brand of weird… and sometimes wonderful security vibes.
These models don’t always follow industry buzzwords. They aren’t trending on Hacker News. But behind the scenes, they’ve helped protect sensitive systems, dodge mass attacks, and keep threats guessing. They’re the oddballs, the security underdogs but don’t mistake them for weak links.
So, grab your cyber-coffee, log out of root, update your threat model… and let’s meet the next batch of “Security by” models.


