Archives For Threat Modeling vNext

Project Managers, Product Owners and the like: what would they want from a Threat Model? Perhaps nothing. Perhaps much is in it for them. This article will shed new light on how less technical roles will benefit from Threat Models.

Continue Reading...

Let’s continue to investigate Threat Modeling vNext by example. This new installment of the series is about Lucy, an expert Threat Modeler.

Continue Reading...

Threat Modeling vNext can be an interesting idea, but what would that practically mean for you? This article tries to provide an answer to that question.

Continue Reading...

I’m happy to announce that on Monday, the 23rd of April, I will participate to WhiteSource’s Secure Coding Virtual Summit with a speak on Threat Modeling vNext.
Please participate!

The link to register is https://securecoding.com/virtual-summit/?utm_source=linkedin&utm_medium=social&utm_campaign=simone-curzi.

What is Threat Modeling vNext? To really understand it, we get a closer look at its genesis, discussing how the need has helped to evolve the vision to what it is now.

Continue Reading...

It is important to identify multiple mitigations, but how to do that? Security Controls are a great way to do that. The article introduces the main concepts and shows some ideas you can use to improve your Threat Models.

Continue Reading...

Mitigations, oh my!

February 27, 2020 — Leave a comment

The main goal of Threat Modeling is to identify the right mitigations to be implemented to minimize the risk. This is the first article to be completed next time, introducing the most important characteristics required to make the best choice when selecting mitigations for your Threat Modeling engagements.

Continue Reading...