In this Summer edition, Brook Schoenfield shares his insights on a wider adoption of threat modeling practices, in terms of tech challenges, risk problems, leadership,…
In our May edition of the TMI newsletter we show off The AI Attack Surface Map, a resource for thinking about the various attack surfaces…
In this blog post, we will explore how OWASP SAMM threat modeling can take security practices from “good” to “great” in implementing a robust Secure…
In this edition, we get a take a look at the Developer-driven threat modeling at OutSystems
In this edition, we get a deep dive into the 2023 Threat Modeling Connect Hackaton
Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.
In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations
In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.
In this edition, we get a guest blog on The Hitchhiker’s Guide for Failing Threat Modeling
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…