
Sign up to save your podcasts
Or
Organizations spend hundreds of work hours to build applications and services that will benefit customers and employees alike. Whether the application/service is externally facing or for internal use only, it is mandatory to identify and understand the scope of potential cyber risks and threats it poses to the organization. But where and how do you start with an accurate threat model? Nick can discuss how to approach this and create a model that's useful to security and developers alike.
Segment Resources
https://github.com/trailofbits/publications/blob/master/reviews/2022-12-curl-threatmodel.pdf
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw229
4.7
3535 ratings
Organizations spend hundreds of work hours to build applications and services that will benefit customers and employees alike. Whether the application/service is externally facing or for internal use only, it is mandatory to identify and understand the scope of potential cyber risks and threats it poses to the organization. But where and how do you start with an accurate threat model? Nick can discuss how to approach this and create a model that's useful to security and developers alike.
Segment Resources
https://github.com/trailofbits/publications/blob/master/reviews/2022-12-curl-threatmodel.pdf
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw229
1,965 Listeners
2,012 Listeners
360 Listeners
628 Listeners
368 Listeners
1,012 Listeners
313 Listeners
386 Listeners
7,842 Listeners
943 Listeners
164 Listeners
187 Listeners
189 Listeners
119 Listeners
33 Listeners