For this edition, we selected a variety of threat modeling content for you. From PASTA to SDWAN and everything in between.
We are happy to announce that we are working with Phished as our partner to bring security awareness to our clients.
In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?
Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
In this blog, we take a look at why good security requirements are important and how these should be constructed.
Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.
This edition contains various fields in which Threat Modeling can play a significant role: MDR, AI/ML, Automation, Pentesting and User Stories. Exciting!
Even the largest game development studios are not spared from cyber attacks as Ubisoft was recently hacked.
Check out our guest article written by Ken Van Wyck on how Threat Modeling can benefit everyone in the Dev team.