Everyone have different needs and face different dangers when their personal data gets exposed. To give actionable privacy advice, it's essential to consider each person's unique situation.
👤 Learn more on how to evaluate each person's threat model.
🧰 Check our Privacy Activist Toolbox tip to […]
A couple of interesting links on SD-WAN security:
* https://www.mplify.net/wp-content/uploads/MEF_88.pdf - securing application flows in SD-WAN solutions (vendor neutral)
* https://arxiv.org/pdf/1811.04583 - focusses on orchestration, management and control (iterates through all the various […]
Another day, another threat model. Credit card company wants to know what they should be on the lookout for by way of discovery, lateral movement and c2 and exfiltration from their micro-segmentation solution as easy wins..
#threatmodelling
In this video, we explain how LINDDUN works, its privacy threat categories, and how it helps organizations safeguard sensitive data and comply with regulations.
watch now: youtu.be/kBWga9f5ev8?...
#LINDDUN #LINDDUNframework #framework #cybersecurity #threatmodelling
Occasionally, I get to do interesting, impactful things. Here's where I built a service and took it GA at Cisco-scale:
blogs.cisco.com/customerexperience/cisco...
#threatmodelling
baby's first (and second and third) potatosecurity webinar #threatmodelling www.youtube.com/playlist?lis...
baby's first (and second and third) cybersecurity webinar #threatmodelling www.youtube.com/playlist?lis...
In this video, we explain how LINDDUN works, its privacy threat categories, and how it helps organizations safeguard sensitive data and comply with regulations.
watch now: youtu.be/kBWga9f5ev8?...
#linddun #lindunnframework #Framework #threatmodelling #cybersecurity
#Threatmodelling is identifying and analysing potential security threats and vulnerabilities in a system, application, or network.
To mitigate potential security risks with a balanced budget, security threat modelling is critical.
Use the (free) SAST for #Python nocomplexity.com/codeaudit/
#owasp
In this article, we will explore the STRIDE methodology, going through each component and its advantages
read more: reconbee.com/stride-threa...
#STRIDE #stridemethodology #strideframework #threatmodelling #framework #CyberSecurity
Running threat-crank to update https://github.com/timb-machine/attack-ti with v18 data.
#threatmodelling
Bruce Schneier has a few words about Digital Threat Modeling Under Authoritarianism.
www.schneier.com/blog/archives/2025/09/di...
#threatmodelling #uspol
banner promoting the Agile Testing Days Workshop by Giancarlo Cordero Ortiz, showing his picture and the title: "Threat Modelling Workshop for QA heroes".
QA folks: you already have the tools to shine in Threat Modelling.
Giancarlo’s workshop will help you connect quality & security where it matters most.
Real cases. Real outcomes. Real fun. 🛡️
tinyurl.com/bdh2uh5a ◀️
#QA #ThreatModelling #AgileTestingDays
Running threat-crank to update https://github.com/timb-machine/attack-ti with v16 and v17 data.
#threatmodelling
Someone asked me to compare and contrast ATT&CK and FiGHT matrices...
> It's probably wise to consider their respective scopes. ATT&CK describes threats that affect typical enterprise networks whereas FiGHT is dedicated to the equipment that can be found in a typical mobile carrier. This […]
Car thought: Isn't AD a browse up architecture? Also, does the team even make real sense given that both the client and server can be both victim and attacker in most scenarios...
#threatmodelling
So @trailofbits released a new threat modelling framework. I really like that, as all of the old existing 'reference' frameworks are so hard to apply in a way that brings any or much value to the process. Or I'm too dumb to do it :P.
Very exciting […]
I think this is the 4th time I've typed something into a generative AI bot intentionally, but our jobs are still safe...
The generative AI links a AV:N, PR:N vulnerability to file and directory discovery, rather than any of the more obvious techniques under reconnaissance or initial access […]
A threat model that includes only PROTECT (apply a secure SDLC, patch regularly, harden etc) is incomplete. More needs to be done by way of DETECT, RESPOND and RECOVER functionality because bugs are going to bug, password2025 is still a thing etc.
#threatmodelling
How to Use Secure Coding Practices in Agile Development
thedefendopsdiaries.com/how-to-use-s...
#securecoding
#agiledevelopment
#cybersecurity
#devsecops
#softwaresecurity
#agilemethodology
#securitypractices
#codingstandards
#securityautomation
#threatmodelling
Tony Blair calls for roll out of digital ID | “…put all your eggs in one basket, it makes it easier to lose them all and for the government to surveil you…”
https://alecmuffett.com/article/110762
#IdCards #ThreatModelling #TonyBlair
Today's awkward question: "So that key management server is for the mainframe backups, where is *it* backed up?", "Well..."
#threatmodelling, #ransomwareondemand
If your #vulnerability scanners keep finding the same issues in different places, you're treating symptoms instead of causes
Modern #AppSec requires systemic fixes, not endless patching
Evolve product security with #ThreatModelling and report on outcomes rather than #vulns
#VEX #DevSecOps #SecOps
Today's achievement: Completed threat model and attack graph for software defined network.
Scope: Management plane, network fabric, wireless infrastructure and endpoints.
#threatmodelling
Mapping my threat model onto the SIEM logs. Which ones are directly useful, which ones can be used for correlation?
You can hazard a good guess from the source types and index names. Next job is to validate assumptions with SOC.
#threatmodelling, #detectionengineering
This link from '22 gives some ideas on how different threat catalogues/dictionaries can work together:
x.com/timb_machine/status/1565...
#threatmodelling