How Threat Modeling Helps with Penetration Testing Scoping
In this article, we’ll answer how threat modeling helps with penetration testing scoping (and the intake process related to pen testing). Threat modeling is a … Read More
In this article, we’ll answer how threat modeling helps with penetration testing scoping (and the intake process related to pen testing). Threat modeling is a … Read More
In this article we’ll talk about the growth of threat modeling tooling. Think about building a new house. You wouldn’t dream of waiting until the … Read More
In this article, we’ll explore how threat modeling can help with vulnerability management. We’ll also add an example with a diagram. I also wrote an … Read More
In this article, we’ll provide the ultimate threat modeling example using multiple methods, including Data Flow Diagrams, Attack Trees, and STRIDE. This approach allows us … Read More
NIST Cyber Security Framework (CSF) 2.0 is a comprehensive framework that describes how cyber security should be organized and implemented to secure an organization from cyber … Read More
Attack trees threat modeling is a method that can be used for threat modeling. Attack trees can provide a helpful overview of potential attacks and … Read More
The digital landscape is vast and continually evolving, prompting the need for comprehensive security measures. With the rise in cyber threats, the European Union (EU) … Read More
Network and Information Security Directive (NIS2) What is it: The Network and Information Security Directive (NIS2) replaces the original NIS. It aims to improve cyber security & resilience within the … Read More
The Threat Modeling Framework describes activities & components needed to perform threat modeling in a structured and systematic manner, from external factors influencing a threat model to the core threats … Read More
Threat modeling can often feel complex and confusing for security professionals who are new to it. Further, it can feel extra complex to developers, management, … Read More