A PASTA Threat Modeling Example
In this article, I’m going to provide a PASTA threat modeling example. PASTA stands for Process for Attack Simulation and Threat Analysis (PASTA). It is a risk-centric threat modeling method developed … Read More
In this article, I’m going to provide a PASTA threat modeling example. PASTA stands for Process for Attack Simulation and Threat Analysis (PASTA). It is a risk-centric threat modeling method developed … Read More
In this article, I explain why PASTA threat modeling and DevOps is a perfect fit. If your organization is using DevOps to provide applications and … Read More
In this article, I explain why threat modeling and DevOps are a great fit, and how you would go about implementing threat modeling within DevOps. … Read More
Trike is a framework for security auditing from a risk-based perspective. This is achieved through Trike threat modeling, which generates threat models. With the Trike … Read More
Proactive STRIDE threat modeling in DevOps to shift security left and embed security thinking within a DevOps team.
In this post I explain what CAPEC threat modeling is, and look at one of the CAPEC Attack Patterns as an example.
STRIDE threat modeling example to show you how STRIDE threat modeling should be performed. This can help with your threat modeling sessions.
In this post, I provide the ultimate list of STRIDE threat examples to inspire your own STRIDE threat modeling sessions.
What is threat modeling: Threat modeling is the activity of identifying threats, weaknesses, and vulnerabilities that may negatively impact the security of an application, system, … Read More
We all want to have more security online, especially with how digital our world has become. Oftentimes, it’s hard to know if you’re really protected … Read More