Tag Archives: threat modeling
My Threat Modeling book is available in 12 networks and supports the Fedora Project.

I started distributing my little e-book to the world a few weeks ago. Now I am sharing that it’s available on at least 12 websites that you probably use, including Barnes and Noble, Google Play, Apple Books, and the Kindle store. If you are curious about the Threat Modeling topic, here is what this book…
Your Threat Modeling e-book is live.

Why e-book? So, I wrote a small e-book compiling all the knowledge I have from researching and training more than 200 people on efficient threat modeling. I decided to push it as an e-book for a few reasons: How is this threat modeling e-book different from the others on the market? First, thanks for choosing…
Me and the Hacker Noon

My Hacker Noon journey started, I believe, a year ago when I became a shareholder in my effort to support free media initiatives. Last month I decided to write for them about privacy and threat modeling. Two topics I care about. If you are interested in following me there here is my profile.
Threat modeling framework under Creative Commons license.

I am so happy that Citrix allowed me to release under Creative Commons license the threat modeling framework I developed in the last four months. What was the challenge? Doing threat modeling is one of the main requirements for almost any Agile organization. Most of the teams are doing it wrong, and as an award,…
Steganography API at your service.

Steganography is the art and science of embedding secret messages in a cover message so that no one, apart from the sender and intended recipient, suspects the existence of the message. The most common example is to hide a message in an image file without compromising how the image looks. The majority of the people…