This is the first “Pill on Threats Manager” and discusses in 10′ how to use Threats Manager to prioritize Threats very efficiently. Enjoy!
Archives For Threat Modeling
Threats Manager v1.5.51 has been shared very recently.
This new video presents the new version and discusses some of its key characteristics. It will be followed soon by a series of “Pills on Threats Manager”, discussing specific characteristics in about 10′.
Be prepared to learn how to do your own Threat Models at light speed!
I have just prepared the first release to fix a couple of bugs over version 1.5.50. This is a minor version (1.5.51), which solves the following problems:
- [BUG] Error when openining TM 1.5.50 on an a PC that has not seen TM yet.
- [BUG] Custom Threats cause an ArgumentNullException in GetPriorityForThreatTypeName.
Please use the new version instead of the previous one.
You can download the new version from here.
A new version of the Threats Manager is out, with many important improvements for usability and bug fixes!Continue Reading...
A new version of the Threats Manager is out!
It improves over the last beta, but it is not complete, yet: I have planned some features to be there, but they are not ready, yet. Nevertheless, I decided to publish this new version because it includes many usability feature, like some shortcuts to improve efficiency.
Even if the new version is not complete and does not contain everything I want to put in, if you are using the Threats Manager I recommend you to install the new version.
As usual, the installation can be performed in-place.
Threats Manager v1.5 BETA2 can be downloaded from here.
The last appointment in a series to understand how to customize the Templates for the Microsoft Threat Modeling Tool 2016. This final article focuses on the Workflow of the Template and gives some details on the consequences of the various changes to the Template.Continue Reading...
The fourth appointment in a series to understand how to customize the Templates for the Microsoft Threat Modeling Tool 2016. This new article focuses on the Threat Properties, that are used to provide information on the Threat itself. We will see how to define them and why it is so important to customize the Threat Properties.Continue Reading...