Gain more insight and create doomsday scenarios for better threat modeling

In previous blogs you could already read about what threat modeling is, and about the 4 steps. In practice, however, threat modeling is more than just a technical analysis of your application. The threat landscape is constantly evolving, and so is your organisation. Therefore, you need to understand the technical and business context, and create doomsday scenarios.

As a result, you have a broader insight of the threats to your application.

Door |2024-09-30T09:26:05+00:00februari 8, 2018|Article, Artikel, Engels, Nederlands|Reacties uitgeschakeld voor Gain more insight and create doomsday scenarios for better threat modeling

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start with SDLC? Siebe and I explained how and why during the OWASP AppSec Europeconference in Belfast. Couldn’t attend? You can find the presentation in this blog, or begin by reading the introduction below.

Door |2024-09-30T08:15:19+00:00november 16, 2017|Artikel, Nederlands|Reacties uitgeschakeld voor Embedding GDPR in the secure development lifecycle (SDLC)

Why every company should get hacked

Did you know that, in traditional western movies, the heroic cowboy wears a white hat, while his enemy wears a black one? That’s where the expression ‘white hat hacking’ comes from. White hat hackers are the good guys. They specialise in penetration testing with the intention of alerting companies to vulnerabilities in their systems, software and networks, to pre-empt hacking attempts by an ill-intentioned individual.

Door |2024-02-17T06:32:36+00:00februari 16, 2017|Article, Artikel, Engels, Nederlands|Reacties uitgeschakeld voor Why every company should get hacked
Ga naar de bovenkant