To answer the question of what makes a “good” threat model, I think it’s a good idea to establish what makes a threat model “bad.” As far as I am concerned, a bad threat model is something that you ...
In a world where cyber threats continue to grow in complexity and quantity each year, threat modeling is one of the most advantageous and practical tools organizations can use to shore up security.
Modern software development involves selecting and integrating tens or hundreds of complex components, services and infrastructure to deliver systems at the speed of business demands. Each integrated ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Home mining is one of the best expressions of individual sovereignty available, but every retail mining operation carries a variety of risks that need to be accounted for and mitigated as much as ...
The Internet of Things (IoT) is changing the way we interact with the world around us. Over the next few years, billions more connected devices will enable us to drive efficiency, boost productivity, ...
Experts At The Table: As hardware weaknesses have become a major target for attackers, the race to find new ways to strengthen chip security has begun to heat up. But one-size does not fit all ...
Threat modelling is the process of visualising vulnerabilities in software from the design phase through the software development lifecycle. A relatively new software security practice, it has ...
Recognizing the value of threat modeling, a process that helps identify potential risks and threats to a business's applications, systems and other resources, is easy enough. By providing ...