Articles by Tag #threatmodeling

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!

OWASP® Cornucopia is launching brand-new versions of the OWASP Cornucopia decks with QR...

Learn More 7 0Feb 14

No need to fear the clouds. Play OWASP Cumulus!

The clouds can be a scary place. All these machines that simply aren't yours. So, how can...

Learn More 2 1Jun 26

Why SysLogs over UDP is silly? Security POV

Before we start let's understand Logs in terms of Threat Modeling STRIDE framework. Here addressing...

Learn More 1 0Feb 17

Part 2: Are You Threatening Me? Using AWS Q CLI for Your Threat Modeling Program

One of the most admirable traits in humans throughout the world is our ability to persist in the...

Learn More 1 0Jul 22

I love seeing two Project leaders coming togetether to deliver TWO playable games under the OWASP banner <3

No need to fear the clouds. Play OWASP...

Learn More 1 0Jun 30

The waiting time is over. OWASP® Cornucopia Website App 2.1 & Mobile App 1.1 have been released! Play OWASP Cornucopia!

OWASP® Cornucopia Website App 2.1 &amp;...

Learn More 0 0Feb 17

[Boost]

No need to fear the clouds. Play OWASP...

Learn More 0 0Jun 30

Threat Modeling in Cybersecurity

Threat Modeling is a structured approach to identify, assess and mitigate potential security threats...

Learn More 0 0Jan 26

Are You Threatening Me? Using Amazon Q Developer to Jumpstart Your Threat Modeling Process

Amazon Q Developer is a quick and easy way to set up threat modeling from the command line. I...

Learn More 0 0Jul 22

Version 2.3 of OWASP Cornucopia has been released!

Threat modeling your AI models using...

Learn More 0 0Jun 11

From Manual to Automated: A Deep Dive into Threat Modeling as Code with Python

How to transform security analysis from a one-time exercise into a continuous, collaborative...

Learn More 0 0Aug 24

Are you letting the AI do the threat modeling?

Does the AI do the threat modeling? ...

Learn More 0 0Jun 17

Does the AI do the threat modeling of your software?

Are you letting the AI do the threat modeling for you? There is no need to let the machines...

Learn More 0 0Jun 11

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Before we start , just quick reminder it’s Threat Modeling not Modelling. Now let recall basic...

Learn More 0 0Feb 13