How to STRIDE Threat Model
In this article, I describe how to STRIDE threat model. STRIDE is a threat modeling method that can help you to identify potential security threats … Read More
In this article, I describe how to STRIDE threat model. STRIDE is a threat modeling method that can help you to identify potential security threats … Read More
What is STRIDE threat modeling: STRIDE threat modeling is a threat modeling method based on the mnemonic spelled out by STRIDE: Spoofing, Tampering, Repudiation, Information … Read More
In this article, I’m going to provide a PASTA threat modeling example. PASTA stands for Process for Attack Simulation and Threat Analysis (PASTA). It is a risk-centric threat modeling method developed … Read More
In this article, I explain why PASTA threat modeling and DevOps is a perfect fit. If your organization is using DevOps to provide applications and … Read More
In this article, I explain why threat modeling and DevOps are a great fit, and how you would go about implementing threat modeling within DevOps. … Read More
Trike is a framework for security auditing from a risk-based perspective. This is achieved through Trike threat modeling, which generates threat models. With the Trike … Read More
Proactive STRIDE threat modeling in DevOps to shift security left and embed security thinking within a DevOps team.
In this post I explain what CAPEC threat modeling is, and look at one of the CAPEC Attack Patterns as an example.
STRIDE threat modeling example to show you how STRIDE threat modeling should be performed. This can help with your threat modeling sessions.
In this post, I provide the ultimate list of STRIDE threat examples to inspire your own STRIDE threat modeling sessions.