adam shostack

@adamshostack

Author, Threat Modeling: Designing for Security. Working to reduce bad security outcomes. Taking a break from Twitter for a while.

(Location not provided)
Joined January 2009

Tweets

You blocked @adamshostack

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @adamshostack

  1. Pinned Tweet
    29 Sep 2014

    Threat Modeling is a Jolt Finalist, the first security-centered book on the list since Schneier’s Secrets & Lies

    Undo
  2. 16 hours ago

    It's so nice to see "history lessons" about "cybersecurity" that start with Multics.

    Undo
  3. Retweeted
    Sep 2
    Replying to

    You can opt out for Tesla too - but you trade some functionality

    Undo
  4. Retweeted
    Sep 2

    These guys are working to digitize some old Skylab and Pioneer 11 data tapes and are looking for advice - more at

    Undo
  5. Sep 2

    Would love to hear if anyone's found anything else.

    Show this thread
    Undo
  6. Sep 2

    I've done some research around electric vehicles. I think lets you turn telematics off. (page 9-17 of talks about declining) Tesla and Chevy didn't.

    Show this thread
    Undo
  7. Retweeted
    Aug 29

    Just got notified of my acceptance to speak about what works in continuous threat modeling at the O’Reilly Software Architecture Conf 2019 in NYC - this should be fun!

    Undo
  8. Retweeted
    Aug 22

    How about 3 days of Advanced Windows Fuzzing and Triage Training by the esteemed ? Yeah, we know you'd like that science drop

    Undo
  9. Retweeted
    Aug 27

    "What’s the legible architecture of these systems?" > great post by on getting the right level of abstraction and detail >

    Undo
  10. Retweeted
    Aug 27

    This is a really neat initiative by Chris Castaldo (). Vendors donated to charities in exchange for his time listening to their pitches. His post-meeting report is here

    Undo
  11. Aug 27

    Longer words take longer to read and distract from your message. Use short ones, or utilize pomposity gracelessly.

    Undo
  12. Retweeted
    Aug 23

    Interested in making continuously secure development a reality? Check out - great keynotes & , expert speakers, industry insights and hands-on workshops. Use OWASP-DSC-2018 for a 20% discount!

    Undo
  13. Retweeted
    Aug 25

    Check out Adam’s sage words about architectural views for

    Undo
  14. Retweeted
    Aug 24

    Threat Model Thursday: Legible Architecture - Blog Post by "Having understandable models of your systems makes it easier for everyone to interact with them, and that makes design easier"

    Undo
  15. Retweeted
    Aug 23

    Some of the most influential minds in cyber security, especially in US gov/policy circles, still have a win32-endpoint-threat-hunting mindset. Its difficult to watch them say what big tech companies should do about security.

    Undo
  16. Retweeted
    Aug 23
    Show this thread
    Undo
  17. Aug 23
    Undo
  18. Retweeted

    HEY: We're hiring a part-time researcher with strong skills to work with us this fall. Come investigate misinformation, media manipulation, scams, fraud etc. If you're in Toronto, great. If not, remote is an option. APPLY SOON. Here's the info:

    Show this thread
    Undo
  19. Retweeted
    Aug 21

    S04E04 -- in a . joins to discuss how to do this and some other tips on .

    Undo
  20. Retweeted
    Aug 21

    Looks like fun! I can also recommend learning Threat Modeling from , it was an eye-opening experience for my own journey back then!

    Undo
  21. Aug 21

    Developing an intentional toolbox for tracking commitments at a conference

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·