InNationwide TechnologybyMehran KoushkebaghiHow to Perform Systemic Threat Modelling — An ExampleIntroductionApr 7, 2021Apr 7, 2021
Chris HughesCISA’s Take on Vulnerability Prioritization and ManagementThis article breaks down CISA’s latest publication “Transforming the Vulnerability Management Landscape”Nov 10, 2022Nov 10, 2022
InTowards AWSbyPawel RzepaAWS security assessment: what scanners are missing and how threat modeling may help you?There are many tools available today that are designed to automate security checks. For example, here’s a good list of open-source AWS…Oct 24, 20222Oct 24, 20222
Mike Rebultan🚥PRODUCT & APPLICATION SECURITY THREAT MODELING with MITRE ATT&CK FRAMEWORK 🔰For many years, we have been thought and practicing different methodologies and frameworks to apply risk mitigations through various threat…Sep 2, 2022Sep 2, 2022
InContino EngineeringbyHector RoblesThreat Modeling Tactics For DevOpsThreat modeling doesn’t have to be nebulous, even for the cloud. Here are some strategies for embedding threat modeling into your…Aug 30, 2022Aug 30, 2022
Jakub Jóźwicki(Introduction to) Simple Cloud Threat ModellingThe observation that people using complex, heavy and formal security frameworks miss and don’t understand very basic security gaps of…Jan 27, 2022Jan 27, 2022
Bill WellsThreat Modeling in HealthcareThis post reviews three threat models, STRIDE, PASTA, and VAST, that can be used to mitigate damage caused by attacks, both external and…Mar 14, 2022Mar 14, 2022
U.Y.Microsoft Threat Modeling Tool’s LogicMicrosoft Threat Modeling Tool (MS TMT) is a free threat modeling tool offered by Microsoft. In this article, I would like to draw very…Sep 3, 2020Sep 3, 2020
cloudsecqueWhy Threat Modelling Is Important For Cloud SecurityData breaches are on the rise, and organizations need to take every possible precaution to protect their data. One of the best ways is…Jan 30, 2022Jan 30, 2022
CWE ProgramThe Missing Piece in Vulnerability ManagementThe CWE/CAPEC Program partners with organizations around the world to further the program’s mission and objectives. The views and opinions…May 4, 20222May 4, 20222
InFAUN — Developer Community 🐾byTanvir AhmedThreat modeling OpenID Connect, OAuth 2.0 for beginners using OWASP Threat Dragon [Part 1]You are reading this post because you probably came across Oauth and OpenID Connect at some point in time and tried to make sense out of…Nov 19, 20183Nov 19, 20183
Deeptesh BhattacharyaThreat Modelling Tools Analysis 101 — OWASP THREAT DRAGONKey DevSecOps solutions available and their benefits and pitfalls through a series of evaluating different tools for Technical Architects…Jun 14, 2020Jun 14, 2020
Sitaraman LakshminarayananYou have done Threat Modeling Whats next?Threat Modeling is a common term within Security Professionals and is often used to identify threats/risks in the hope of mitigating those…Jul 27, 2020Jul 27, 2020
InNationwide TechnologybyMatin MavaddatThreat modelling — a systemic approachIntroductionFeb 9, 2021Feb 9, 2021
Alan BlackmoreAWS Diagram ArchitectureWhen you work with AWS cloud architecture, you almost certainly understand the importance of documenting your AWS VPCs and container…Jun 22, 20221Jun 22, 20221
Priya PandeyThreat Modeling — Cloud (Part 1)In this post I have tried to put together my thoughts on threat modeling in cloud.Feb 18, 2022Feb 18, 2022
Rahul JadhavKubernetes Threat ModelingEvery security team has to deal with one question: “Are my services/deployments secure?”Oct 4, 2021Oct 4, 2021
InLevel Up CodingbyRobert LagerströmA flexible open-source attack simulation frameworkThreat modeling is becoming more and more common for both application development and system analysis. However, most threat modeling…Jun 22, 2021Jun 22, 2021