The Advantages of Using a Threat Modeling Tool for STRIDE
The advantages of using a threat modeling tool for STRIDE consist of: Before I move on, what is STRIDE threat modeling: STRIDE is a type … Read More
The advantages of using a threat modeling tool for STRIDE consist of: Before I move on, what is STRIDE threat modeling: STRIDE is a type … Read More
You can perform threat modeling without any tooling whatsoever. In that case, all you need is motivation, a whiteboard (or a digital equivalent), good teamwork, … Read More
In this article, I’ll provide STRIDE threat modeling frequently asked questions and answers. What is STRIDE Threat Modeling? STRIDE threat modeling is a threat modeling … Read More
In this article, I describe how to use Data Flow Diagrams in threat modeling. Data Flow Diagrams (or DFDs for short) are used extensively in … Read More
In this article, I describe how to STRIDE threat model. STRIDE is a threat modeling method that can help you to identify potential security threats … Read More
What is STRIDE threat modeling: STRIDE threat modeling is a threat modeling method based on the mnemonic spelled out by STRIDE: Spoofing, Tampering, Repudiation, Information … Read More
In this article, I’m going to provide a PASTA threat modeling example. PASTA stands for Process for Attack Simulation and Threat Analysis (PASTA). It is a risk-centric threat modeling method developed … Read More
In this article, I explain why PASTA threat modeling and DevOps is a perfect fit. If your organization is using DevOps to provide applications and … Read More
In this article, I explain why threat modeling and DevOps are a great fit, and how you would go about implementing threat modeling within DevOps. … Read More
Trike is a framework for security auditing from a risk-based perspective. This is achieved through Trike threat modeling, which generates threat models. With the Trike … Read More