Published inAnalytics VidhyaWhat I have learned from working compliantly with AWS Security RequirementsSkip the manual Threat Modeling and save yourself and your colleagues some time, use an automated Threat Modeling toolMar 15, 2021Mar 15, 2021
Published inFAUN — Developer Community 🐾The Missing Piece in DevSecOpsHow can you overcome DevSecOps Challenges in Practice?Mar 3, 2021Mar 3, 2021
Published inFAUN — Developer Community 🐾Engineer your security architecture - Using threat modeling & cyber-attack simulationsIt is time to be the engineers we are trained to be, also when it comes to IT and security.Feb 22, 2021Feb 22, 2021
Published inNerd For TechInternet— Security analysis with Threat ModelingThe “Internet” attack vector is always relevant to take into consideration unless the architecture has no connection to the outside world.Feb 19, 2021Feb 19, 2021
Published inNerd For TechPhishing — Security analysis with Threat ModelingWhen looking at the Phishing attack scenario, it is also coming from an external/foreign network zone.Feb 19, 2021Feb 19, 2021
Published inDataDrivenInvestorHow to prevent cyber attacks on connected cars using Threat ModelingThe automotive industry is undergoing major change towards increasingly connected and autonomous cars, and with more vehicles using V2X…Feb 18, 2021Feb 18, 2021
Insider/Burglary — Security analysis with Threat ModelingInsider/Burglary - Attack Vector ConceptFeb 17, 2021Feb 17, 2021
Published inAnalytics VidhyaAir Gap — Security analysis with Threat ModelingAn air gap attack is an attack that travels into a network architecture even though it is network wise isolated to the rest of theFeb 16, 2021Feb 16, 2021
Published inNerd For TechAdditional Gateways — Security analysis with Threat ModelingAdditional Gateways — Attack Vector Concept, Depending on where the attacker is connected, you will model different “attack scenarios”Feb 15, 2021Feb 15, 2021
Published inFAUN — Developer Community 🐾Threat Modeling — Step by StepWhat is Threat Modeling?Feb 8, 2021Feb 8, 2021