-
I’m Talking about
#Videogame#ThreatModel and#vulnerability intelligence at scale, tomorrow @ the@DubGamesSummitpic.twitter.com/J8rU2Ue7IA -
Does your
#ThreatModel enable you to take informed security decisions? http://bit.ly/2kfxu0R#AppSecpic.twitter.com/nGdOxw4Tou
-
upgrade your application risk management with PASTA, an evidence-based risk centric threat modeling methodology
#PASTA#threatmodeling#threatmodel#cybersecurity#infosec#riskmanagement#appsec#cyber#tech#AI#machinelearning#DataScience#CDO#CIO#fintech#tech#Analyticspic.twitter.com/3oib7JL11j
-
Whilst logging is great, make sure you are logging for a reason and with a
#threatmodel in mind. Otherwise you will be overwhelmed with data. https://twitter.com/NCSC/status/1017719536693506048 … -
Our version of OWASP Threat Dragon has Gitlab integration and will create threat models without external dependencies. Try it and assess your security posture. http://bit.ly/2BHb28n
#ThreatModel#AppSecpic.twitter.com/mIERwh84SE
-
Wisedom off
#InfoSec-Muzak: „we're not white hats tryin to write reports any box can be popped with the right resource so your#threatmodel 's worthless, NICE REPORT“ MP3: http://github.com/downloads/sophsec/sophsec.github.com/nice_report.mp3 … Lyrics: http://github.com/downloads/sophsec/sophsec.github.com/nice_report.txt … -
First time riding public transit on the freeway.... Why do I have to wear a seatbelt in the car, but I can literally stand in the front of a 30 pax bus for an hour.... As long as I stay behind the yellow line...
#threatmodelএই থ্রেডটি দেখান -
Loosing sleep worrying about a security breach? You might want to consider the Threat Model approach. http://bit.ly/2kfxu0R
#AppSec#ThreatModel pic.twitter.com/jb8tvrmcT6
-
Are you at
@owasp@AppSecEU this week? Learn how to build an amazing threat library for your application#threatmodel with@t0nyuv tomorrow at 1:30pm! Sign up at http://bit.ly/2lqLylR#OWASP#AppSec#AppSecEU#infosec#cybersecurity#cloud#threatmodeling#techpic.twitter.com/iQ9Wmcdy9U
-
Have you heard of PASTA? Get a detailed overview on how this risk centric threat modeling methodology can improve your application risk management at http://bit.ly/2lwyTOh
#PASTA#threatmodeling#threatmodel#cybersecurity#infosec#riskmanagement#appsec#cyber#IoTpic.twitter.com/T6Wquu4oMW
-
Just had time to review this Awesome presentation by Fraser
@zeroXten "Threat Modeling: The Ultimate#DevSecOps " featuring the OWASP Cloud Security project (@OWASP_CloudSec)#DevOps#Cloud#ThreatModel https://lnkd.in/ev9GDiW -
For anyone interested, here are the slides from my
@cloudsa talk "Threat Modeling: The Ultimate DevSecOps" featuring the OWASP Cloud Security project (@OWASP_CloudSec) https://speakerdeck.com/zeroxten/threat-modeling-the-ultimate-devsecops?slide=1 …#DevOps#Cloud#CloudSecurity#ThreatModel#DevSecOps -
“Generate Reports that capture Threat Models, Vulnerabilities and a best case attempt to correlate Vulnerabilities to their related Threat Models based on CWE IDs” Testing proves the
#ThreatModel#ThreatModeling https://we45.gitbook.io/threatplaybook/ -
Stoked to pre-release
@we45's "ThreatPlaybook", framework w/ "#ThreatModel as Code" &#AppSec Automation. Demo w/@nmap,@zaproxy. Docs: https://we45.gitbook.io/threatplaybook/ cc:@roberthurlbut,@DinisCruz,@owasp,@StegoPax,@vanderaj,@robotframework#opensource#DevSecOpshttps://www.youtube.com/watch?v=zmfMe-2Akl0&t=59s … -
An example snippet from
@we45's#ThreatPlaybook testing before#opensource release next week. The tool allows you to not only codify UserStory>AbuserStory>#ThreatModel>SecurityTestCase, but also trigger#automated scans with multiple tools like@zaproxy,@Burp_Suite,@nmap etcpic.twitter.com/kcWmgpikMM
এই থ্রেডটি দেখান -
I'm super excited to be speaking at the
@cloudsa Cloud Security Alliance Summit at@Infosecurity this year on how threat modeling can help with Cloud DevSecOps, with examples from the@OWASP_CloudSec project! http://www.infosecurityeurope.com/en/Sessions/61959/Threat-Modeling-The-Ultimate-DevSecOps …#cloud#security#threatmodel -
«Pour converser avec le directeur sûreté, la DGSE opte pour la création d’une adresse mail dont l’intitulé est surprenant : grosmarmotte@gmail.com»
#WTF#ThreatModel cc@manhackhttps://twitter.com/ismaelhat/status/988083894883946496 …এই থ্রেডটি দেখান -
So,what does everyone think about the inclusion of IAM actions in the threat stories? Too much detail? Useful? Here's an example.
#cybersecurity#cloudsecurity#threatmodel pic.twitter.com/ue1HFRRR02
এই থ্রেডটি দেখান
লোড হতে বেশ কিছুক্ষণ সময় নিচ্ছে।
টুইটার তার ক্ষমতার বাইরে চলে গেছে বা কোনো সাময়িক সমস্যার সম্মুখীন হয়েছে আবার চেষ্টা করুন বা আরও তথ্যের জন্য টুইটারের স্থিতি দেখুন।