Iza HedlundinAnalytics VidhyaWhat I have learned from working compliantly with AWS Security RequirementsSkip the manual Threat Modeling and save yourself and your colleagues some time, use an automated Threat Modeling tool3 min read·Mar 15, 2021----
Iza HedlundinFAUN — Developer Community 🐾The Missing Piece in DevSecOpsHow can you overcome DevSecOps Challenges in Practice?9 min read·Mar 3, 2021----
Iza HedlundinFAUN — Developer Community 🐾Engineer your security architecture - Using threat modeling & cyber-attack simulationsIt is time to be the engineers we are trained to be, also when it comes to IT and security.4 min read·Feb 22, 2021----
Iza HedlundinNerd For TechInternet— Security analysis with Threat ModelingThe “Internet” attack vector is always relevant to take into consideration unless the architecture has no connection to the outside world.2 min read·Feb 19, 2021----
Iza HedlundinNerd For TechPhishing — Security analysis with Threat ModelingWhen looking at the Phishing attack scenario, it is also coming from an external/foreign network zone.3 min read·Feb 19, 2021----
Iza HedlundinDataDrivenInvestorHow to prevent cyber attacks on connected cars using Threat ModelingThe automotive industry is undergoing major change towards increasingly connected and autonomous cars, and with more vehicles using V2X…4 min read·Feb 18, 2021----
Iza HedlundInsider/Burglary — Security analysis with Threat ModelingInsider/Burglary - Attack Vector Concept2 min read·Feb 17, 2021----
Iza HedlundinAnalytics VidhyaAir Gap — Security analysis with Threat ModelingAn air gap attack is an attack that travels into a network architecture even though it is network wise isolated to the rest of the4 min read·Feb 16, 2021----
Iza HedlundinNerd For TechAdditional Gateways — Security analysis with Threat ModelingAdditional Gateways — Attack Vector Concept, Depending on where the attacker is connected, you will model different “attack scenarios”2 min read·Feb 15, 2021----
Iza HedlundinFAUN — Developer Community 🐾Threat Modeling — Step by StepWhat is Threat Modeling?5 min read·Feb 8, 2021----