Threat modeling promotes the idea of thinking like an attacker. It enables organizations to build software with security considerations, rather than addressing security as an afterthought. However, there are some very common misconceptions that can cause firms to lose their grip around the threat modeling process. This eBook shines a bright light onto the essentials and helps to get your bearings straight with all things related to threat modeling.
Download the complete eBook to:
Learn about the most common threat modeling misconceptions
Discover the 5 pillars of a successful threat model
Determine how to take control of your risk management process
The eBook is published on my company's website, you can download the same from here:
I have worked at various levels in the software industry since my graduation in 1987. I have several years of software programming experience around the globe, from Bangalore, India to Dubai, United Arab Emirates, to the United States. I have been working on JEE and .NET technologies exclusively for the last several years. Since joining Cigital, have been working on all of Secure SDLC activities such as code review, Threat Modeling, ARA, and training.
I am also very involved in the Java community. Several of my own book reviews, articles have been published by JavaLobby.