Articles by Tag #threatmodeling

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!

OWASP® Cornucopia is launching brand-new versions of the OWASP Cornucopia decks with QR...

Learn More 7 0Feb 14

Version 2.3 of OWASP Cornucopia has been released!

Threat modeling your AI models using...

Learn More 4 0Jun 11

Why SysLogs over UDP is silly? Security POV

Before we start let's understand Logs in terms of Threat Modeling STRIDE framework. Here addressing...

Learn More 1 0Feb 17

The waiting time is over. OWASP® Cornucopia Website App 2.1 & Mobile App 1.1 have been released! Play OWASP Cornucopia!

OWASP® Cornucopia Website App 2.1 &...

Learn More 0 0Feb 17

Does the AI do the threat modeling of your software?

Are you letting the AI do the threat modeling for you? There is no need to let the machines...

Learn More 0 0Jun 11

Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Intro Hello World! 👋 I'm Makita, founder of a tech business based in vibrant Florida, deeply...

Learn More 0 0Jul 13 '24

Are you letting the AI do the threat modeling?

Does the AI do the threat modeling? ...

Learn More 0 0Jun 17

Threat Modeling in Cybersecurity

Threat Modeling is a structured approach to identify, assess and mitigate potential security threats...

Learn More 0 0Jan 26

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Before we start , just quick reminder it’s Threat Modeling not Modelling. Now let recall basic...

Learn More 0 0Feb 13

Why Threat Modeling is Crucial for Banking Industries in 2024

In an era of escalating cyber threats, the banking industry faces unprecedented challenges in...

Learn More 0 0Jul 18 '24

No need to fear the clouds. Play OWASP Cumulus!

The clouds can be a scary place. All these machines that simply aren't yours. So, how can...

Learn More 0 0Jun 26