Managed Attribution Threat Modeling
Let's talk CAKED, a threat model for managed attribution.
Let's talk CAKED, a threat model for managed attribution.
Swim lane diagrams have been formalized in message sequence charts - what that means.
Recently, I've seen four cybersecurity approaches for medical devices, and we can learn by juxtaposing them.
“Includes No Dirt” is a threat modeling approach by William Dogherty and Patrick Curry of Omada Health, and I've been meaning to write about it since it came out.
Some interesting things I've recently found
Don't go into Threat Modeling with this mindset.
Just what the title says.
Just a few things for now
I recently had a chance to speak at the meeting for the Portland, Oregon chapter of OWASP
Sharing for you, bookmarking for me.
A breakdown of CTFs and eSports
I'm excited to announce that I'm hitting my STRIDE and Linkedin has released the second course in my in-depth exploration of STRIDE: Tampering.
Threat modeling isn’t one task — its a collection of tasks that build on each other to produce more valuable insights.
Just what the title says
I'm excited to be teaming up with Alpha Strike and Limes Security to deliver training in Vienna November 6-8.