Threat Modeling
Copied from Matthew Coles, because a lot of people expect me to have this. :)
Created by
@adamshostack.bsky.social
@threatdragon.bsky.social
Threat Dragon threat modeling tool from OWASP owasp.org/www-project-threat-dragon/
@threatmodeling.dev
Threat model and prosper! 🖖 OWASP pytm Leader | OWASP Events Committee Chair (2024)
@brkschoenfield.bsky.social
Having become ridiculously dependent on software that cannot be proven correct, we better get a lot better at finding and fixing our vulnerable mistakes. Fact check: daily breach news
@roberthurlbut.bsky.social
Principal #AppSec Architect / #ThreatModeling Lead @ Aquia. PhD in Space Cybersecurity student at Capitol Technology University, MS MVP, Co-host of Application Security Podcast
@shehackspurple.bsky.social
Best-selling author of Alice and Bob Learn Secure Coding & Alice and Bob Learn Application Security. Secure Code Trainer - Nerd @Semgrep #AppSec she/her https://shehackspurple.ca 🌻
@eternewbie.bsky.social
Security professional. Author. Speaker. Mentor. Always a newbie, continual learner. Avid gamer. #threatmodeling | OWASP pytm | The Security Table podcast
@adamshostack.bsky.social
Threat modeling. BH Review Board. Affiliate Professor, UW. Fixed autorun. Helped create CVE. Not sure why we're building graphs on yet another (effectively) centralized system. https://infosec.exchange/@adamshostack