Tag: Threat Modeling
-
Threat Modeling and Understanding Inherent Threats – Adam Shostack – ESW #359
This is a great interview with Adam Shostack on all things threat modeling. He’s often the first name that pops into people’s heads when …
-
Behind the Scenes: The Art of Safeguarding Non-Human Identities
In the whirlwind of modern software development, teams race against time, constantly pushing the boundaries of innovation and efficiency. …
-
Redefining Threat Modeling – Security Team Goes on Vacation – Jeevan Singh – ASW Vault
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on Dec 13, …
-
IriusRisk Brings Threat Modeling to Machine Learning Systems
As part of “shift left” to incorporate security discussions earlier in the software development lifecycle, organizations are beginning to …
-
Fast-Track Secure Development Using Lite Threat Modeling
The Lite Threat Modeling Approach LTM is a streamlined approach to identify, assess, and mitigate potential security threats and …
-
Threat Modeling in the Age of OpenAI’s Chatbot
New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting …
-
#RSAC: Plain Language Threat Modeling for DevSecOps
Threat modeling is an approach that can potentially be overly complicated, but it doesn’t have to be that way, according to Alyssa Miller, …
-
Key Advice for Improving Your Company’s Cybersecurity
And while no single tactic, practice, process, or technology can guarantee security, it’s important to begin implementing or upgrading …
-
How Does Threat Modeling Work in Software Development?
Threat modeling should be a continuous process alongside development, not a one-time …
-
Dr Gary McGraw Appointed to IriusRisk Threat Modeling Technical Advisory Board
Application security threat modeling solutions provider IriusRisk has announced the appointment of Dr Gary McGraw to its threat modeling …
-
Security Pros Push for More Pervasive Threat Modeling
During a threat modeling exercise for a large development team, hacker and security advocate Alyssa Miller was floored when a developer …
-
How and Why to Take a Holistic Approach to Threat Modeling
taking a broader, more expansive view of threat modeling, organizations can consider the whole picture of their security strategy and …
●●●