
Sign up to save your podcasts
Or
Send us a text
The topic of today is threat modeling, a practice of identifying and prioritizing potential threats and security mitigations.Our guests are Anne Oikarinen from Nixu, and Nicolaj Græsholt from Eficode. Be sure to check out their profiles on Twitter and LinkedIn:- https://twitter.com/Anne_Oikarinen- https://www.linkedin.com/in/anne-oikarinen- https://twitter.com/figaw- https://www.linkedin.com/in/nicolajgraesholtRelated links:Webinar with Bankdata: Compliance and security in the DevOps worldhttps://hubs.li/H0NlrYx0Books to read:Threat Modeling: Designing for Security, by Adam Shostack, Wiley: https://threatmodelingbook.com/ Threat Modeling Manifesto: https://www.threatmodelingmanifesto.org/ Evil user stories: https://www.nixu.com/fi/node/1639Cyber Bogies card deck: https://github.com/nixu-corp/NixuCyberBogiesExplanatory blog for the cards: https://www.nixu.com/fi/blog/gamify-your-threat-modeling-nixu-cyber-bogiesBlogs:1. Mitigate against tampering attacks - Secure your software delivery chain: https://hubs.li/H0NlsPR02. Privacy by design: where security meets usability: https://hubs.li/H0NlsTN05
22 ratings
Send us a text
The topic of today is threat modeling, a practice of identifying and prioritizing potential threats and security mitigations.Our guests are Anne Oikarinen from Nixu, and Nicolaj Græsholt from Eficode. Be sure to check out their profiles on Twitter and LinkedIn:- https://twitter.com/Anne_Oikarinen- https://www.linkedin.com/in/anne-oikarinen- https://twitter.com/figaw- https://www.linkedin.com/in/nicolajgraesholtRelated links:Webinar with Bankdata: Compliance and security in the DevOps worldhttps://hubs.li/H0NlrYx0Books to read:Threat Modeling: Designing for Security, by Adam Shostack, Wiley: https://threatmodelingbook.com/ Threat Modeling Manifesto: https://www.threatmodelingmanifesto.org/ Evil user stories: https://www.nixu.com/fi/node/1639Cyber Bogies card deck: https://github.com/nixu-corp/NixuCyberBogiesExplanatory blog for the cards: https://www.nixu.com/fi/blog/gamify-your-threat-modeling-nixu-cyber-bogiesBlogs:1. Mitigate against tampering attacks - Secure your software delivery chain: https://hubs.li/H0NlsPR02. Privacy by design: where security meets usability: https://hubs.li/H0NlsTN0285 Listeners
153 Listeners
5,241 Listeners
29 Listeners
36 Listeners
16 Listeners