A convenient guide to starting you on Threat Modeling – part one

Thread Modeling: Part of a session

Per Wikipedia, the core definition of threat modeling is “A process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.” Suppose we want to get practical and decode this into something everyone can understand. In that case, it’s answering four simple … Read more

Github <> Fediverse (updated)

My twitter account with a few registration fields selected

have a favor to ask. I want to add my fediverse (a.k.a Mastodon) account to my GitHub profile, but I need help. Could you please give equal opportunities to everyone to share their “social” accounts with everyone? It’s unfair to offer just a Twitter account.

Sharing your birthday online can turn you into a victim of an attack.

Sharing your birthday publicly brings some risks for you, and you might become a victim of a birthday phishing attack. I am sure you are happy when you see the wall of congratulations on your Meta, Twitter, or Linkedin feeds. It brings joy and sometimes false happiness that you have so many friends who care … Read more

Doing Threat Modeling properly will help your teams create more secure products.

I created something beautiful, and I want to give the knowledge to you. How did it start? While analyzing the SDLC in a company I worked for, I realized a few dangerous gaps in our threat modeling process. I also talked with my network of professionals in other companies and understood that they have the … Read more