Thomas Lemaitre

TMI newsletter 18 – Threat Modeling can be considered as fun as cooking a good PASTA meal Part 2

In this edition, you can read the second part of why Threat Modeling can be considered as fun as cooking a good PASTA meal!

How to implement application risk profiling

In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.

Implementing security requirements to ‘shift left’ and create ‘secure by design’ software

In this blog, we take a look at why good security requirements are important and how these should be constructed.

Start typing and press Enter to search

Shopping Cart