Skip to content
Navigation menu
Log in
Create account
Forem
Close
#
threatmodeling
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
No need to fear the clouds. Play OWASP Cumulus!
johan sydseter
johan sydseter
johan sydseter
Follow
for
OWASP® Foundation
Jun 26
No need to fear the clouds. Play OWASP Cumulus!
#
cloud
#
threatmodeling
#
appsec
#
gamedev
2
 reactions
Comments
1
 comment
4 min read
Does the AI do the threat modeling of your software?
johan sydseter
johan sydseter
johan sydseter
Follow
for
OWASP® Foundation
Jun 11
Does the AI do the threat modeling of your software?
#
ai
#
threatmodeling
#
appsec
#
openai
Comments
Add Comment
3 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Feb 13
Why “Think Like an Attacker” is harmful FT: Threat Modeling?
#
security
#
threatmodeling
#
cybersecurity
#
pentest
Comments
Add Comment
2 min read
Why SysLogs over UDP is silly? Security POV
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Feb 17
Why SysLogs over UDP is silly? Security POV
#
cybersecurity
#
syslog
#
udp
#
threatmodeling
1
 reaction
Comments
Add Comment
2 min read
OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!
johan sydseter
johan sydseter
johan sydseter
Follow
for
OWASP® Foundation
Feb 14
OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!
#
appsec
#
security
#
threatmodeling
#
agile
7
 reactions
Comments
Add Comment
5 min read
Why Threat Modeling is Crucial for Banking Industries in 2024
Jesscica Jones
Jesscica Jones
Jesscica Jones
Follow
Jul 18 '24
Why Threat Modeling is Crucial for Banking Industries in 2024
#
threatmodeling
#
bankingindustry
#
threatattacks
#
threatmodelingtraining
Comments
Add Comment
2 min read
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively
Makita Tunsill
Makita Tunsill
Makita Tunsill
Follow
Jul 13 '24
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively
#
threatmodeling
#
devsecops
#
cybersecurity
#
learning
Comments
Add Comment
2 min read
Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)
Public_Cloud
Public_Cloud
Public_Cloud
Follow
Jun 28 '24
Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)
#
cloudpractitioner
#
threatmodeling
#
disasterrecovery
#
devsecops
1
 reaction
Comments
Add Comment
3 min read
Modelagem de Ameaças -Decompondo o Aplicativo
brmartin | Bruno Martins
brmartin | Bruno Martins
brmartin | Bruno Martins
Follow
for
Leão de Chácara
Feb 26 '23
Modelagem de Ameaças -Decompondo o Aplicativo
#
braziliandevs
#
threatmodeling
#
security
#
appsec
2
 reactions
Comments
Add Comment
7 min read
Terminologias Utilizadas em Modelagem de Ameaças
brmartin | Bruno Martins
brmartin | Bruno Martins
brmartin | Bruno Martins
Follow
for
Leão de Chácara
Feb 25 '23
Terminologias Utilizadas em Modelagem de Ameaças
#
threatmodeling
#
security
#
braziliandevs
#
appsec
2
 reactions
Comments
Add Comment
4 min read
Modelagem de Ameaças - Introdução
brmartin | Bruno Martins
brmartin | Bruno Martins
brmartin | Bruno Martins
Follow
for
Leão de Chácara
Feb 22 '23
Modelagem de Ameaças - Introdução
#
threatmodeling
#
appsec
#
devsecops
#
security
2
 reactions
Comments
Add Comment
3 min read
A Guide to Effective Threat Modeling
Nuk
Nuk
Nuk
Follow
for
GuardRails
Nov 10 '22
A Guide to Effective Threat Modeling
#
threatmodeling
4
 reactions
Comments
Add Comment
4 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account