
Sign up to save your podcasts
Or
Send us a text
The topic of today is threat modeling, a practice of identifying and prioritizing potential threats and security mitigations.Our guests are Anne Oikarinen from Nixu, and Nicolaj Græsholt from Eficode. Be sure to check out their profiles on Twitter and LinkedIn:- https://twitter.com/Anne_Oikarinen- https://www.linkedin.com/in/anne-oikarinen- https://twitter.com/figaw- https://www.linkedin.com/in/nicolajgraesholtRelated links:Webinar with Bankdata: Compliance and security in the DevOps worldhttps://hubs.li/H0NlrYx0Books to read:Threat Modeling: Designing for Security, by Adam Shostack, Wiley: https://threatmodelingbook.com/ Threat Modeling Manifesto: https://www.threatmodelingmanifesto.org/ Evil user stories: https://www.nixu.com/fi/node/1639Cyber Bogies card deck: https://github.com/nixu-corp/NixuCyberBogiesExplanatory blog for the cards: https://www.nixu.com/fi/blog/gamify-your-threat-modeling-nixu-cyber-bogiesBlogs:1. Mitigate against tampering attacks - Secure your software delivery chain: https://hubs.li/H0NlsPR02. Privacy by design: where security meets usability: https://hubs.li/H0NlsTN05
22 ratings
Send us a text
The topic of today is threat modeling, a practice of identifying and prioritizing potential threats and security mitigations.Our guests are Anne Oikarinen from Nixu, and Nicolaj Græsholt from Eficode. Be sure to check out their profiles on Twitter and LinkedIn:- https://twitter.com/Anne_Oikarinen- https://www.linkedin.com/in/anne-oikarinen- https://twitter.com/figaw- https://www.linkedin.com/in/nicolajgraesholtRelated links:Webinar with Bankdata: Compliance and security in the DevOps worldhttps://hubs.li/H0NlrYx0Books to read:Threat Modeling: Designing for Security, by Adam Shostack, Wiley: https://threatmodelingbook.com/ Threat Modeling Manifesto: https://www.threatmodelingmanifesto.org/ Evil user stories: https://www.nixu.com/fi/node/1639Cyber Bogies card deck: https://github.com/nixu-corp/NixuCyberBogiesExplanatory blog for the cards: https://www.nixu.com/fi/blog/gamify-your-threat-modeling-nixu-cyber-bogiesBlogs:1. Mitigate against tampering attacks - Secure your software delivery chain: https://hubs.li/H0NlsPR02. Privacy by design: where security meets usability: https://hubs.li/H0NlsTN0284 Listeners
40 Listeners
269 Listeners
7,067 Listeners
55 Listeners
15 Listeners
24 Listeners
17 Listeners
5 Listeners