Threat Modeling

Threat Composer

In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!

TMI newsletter 27 – Unleashing the Power of Threat Modeling

In this Summer edition, Brook Schoenfield shares his insights on a wider adoption of threat modeling practices, in terms of tech challenges, risk problems, leadership,…

TMI newsletter 26 – The AI Attack Surface Map

In our May edition of the TMI newsletter we show off The AI Attack Surface Map, a resource for thinking about the various attack surfaces…

OWASP SAMM Threat Modeling: From Good to Great

In this blog post, we will explore how OWASP SAMM threat modeling can take security practices from “good” to “great” in implementing a robust Secure…

TMI newsletter 25 – Developer-driven threat modeling at OutSystems

In this edition, we get a take a look at the Developer-driven threat modeling at OutSystems

The added benefit to early threat modeling that nobody talks about.

Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.

TMI newsletter 23 – Supply-Chain Security: Evaluation of Threats and Mitigations

In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations

The Importance of Accurate Notes During Threat Model Meetings

In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.

TMI newsletter 22 – The Hitchhiker’s Guide for Failing Threat Modeling

In this edition, we get a guest blog on The Hitchhiker’s Guide for Failing Threat Modeling

Start typing and press Enter to search

Shopping Cart