Threat Modeling

TMI newsletter 27 – Unleashing the Power of Threat Modeling

In this Summer edition, Brook Schoenfield shares his insights on a wider adoption of threat modeling practices, in terms of tech challenges, risk problems, leadership,…

TMI newsletter 26 – The AI Attack Surface Map

In our May edition of the TMI newsletter we show off The AI Attack Surface Map, a resource for thinking about the various attack surfaces…

OWASP SAMM Threat Modeling: From Good to Great

In this blog post, we will explore how OWASP SAMM threat modeling can take security practices from “good” to “great” in implementing a robust Secure…

TMI newsletter 25 – Developer-driven threat modeling at OutSystems

In this edition, we get a take a look at the Developer-driven threat modeling at OutSystems

The added benefit to early threat modeling that nobody talks about.

Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.

TMI newsletter 23 – Supply-Chain Security: Evaluation of Threats and Mitigations

In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations

The Importance of Accurate Notes During Threat Model Meetings

In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.

Unlocking the Power of Threat Modeling: A Self-Paced Introduction for Stakeholders

Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…

Start typing and press Enter to search

Shopping Cart