Software Integrity

Archive for the 'Threat Modeling' Category

 

How to Benchmark Your Software Security Strategies

Evaluating the progress of your software security journey is essential, but it can be a considerable challenge. Tracking operational metrics doesn’t tell you whether you are doing the right things. Analyst reports are often too general to provide tactical direction. And companies hold their security plans so close to the vest, it makes competitive research […]

Continue Reading...

Posted in Application Security, Maturity Model (BSIMM), Threat Modeling | No Comments »

 

Internet of Things (IoT): Rethinking the Threat Model

On February 4, 2017, a Saturday night, a high-school student in the U.K. realized he wasn’t going to university to study computer science so he wrote a short program in C, and within a few hours had 150,000 internet-connected printers across the world spitting out ASCII art and messages. All this was harmless although the […]

Continue Reading...

Posted in Industrial Control System Security, Internet of Things, Software Composition Analysis, Software Security Testing, Threat Modeling | No Comments »

 

3 Presentations You Don’t Want to Miss at AppSec California 2017

The Fourth Annual AppSec California Conference kicks off in one week at the Annenberg Beach House in Santa Monica, California. From January 23-25, security professionals, developers, penetration testers, and QA and testing professionals come together to share their knowledge and experiences about secure systems and secure development methodologies. We’re excited to attend the event as Platinum […]

Continue Reading...

Posted in Application Security, Maturity Model (BSIMM), Mobile Application Security, Security Conference or Event, Software Security Program Development, Threat Modeling | Comments Off on 3 Presentations You Don’t Want to Miss at AppSec California 2017

 

Checklist: Take Control of Your Risk Management Process

The power of threat modeling is that it makes you think about your system’s specific characteristics. It allows you to gain visibility around weaknesses that pose significant impact to your entire organization. This checklist explores four key ways to use threat modeling to avoid sink holes in your risk management process. Identify threats that exist […]

Continue Reading...

Posted in Security Risk Assessment, Software Security Testing, Threat Modeling | Comments Off on Checklist: Take Control of Your Risk Management Process