David Akumablog.davidakuma.com·Jul 6, 2024Threat Modeling - Understanding your system's security postureSoftware systems are designed to withstand attacks, which can only be achieved by a proper knowledge of the breadth and length of your system's attack surface area. When building on a cloud platform like AWS, there are guidelines and best practices i...Discuss·39 readsCloud EngineeringAWS sra
Nikhil Pandeynikhilpandeydigital.hashnode.dev·Mar 13, 2024What Is Threat Modeling?Threat modeling is the process of using hypothetical scenarios, system diagrams, and testing to help secure systems and data. By identifying vulnerabilities, helping with risk assessment, and suggesting corrective action, threat modeling helps improv...Discuss·10 likesDREAD threat modeling
Whyme | NodeX CapitalforNodeX Portal ✨nodexploit.hashnode.dev·Jul 11, 2022Stride Airdrop Details - (Bahasa Indonesia)Dengan peluncuran Stride hanya dalam dua minggu, sudah saatnya kami membagikan detail airdrop kami! Ticker token Stride adalah $ ST. Total pasokan ST adalah 100.000.000 token, dengan pasokan genesis 20.000.000. Rincian alokasi penuh akan diumumkan ak...DiscussStride
freeCodeCampforfreeCodeCampfreecodecamp.org·Jul 30, 2019How to analyze the security of your application with threat modelingBy Goran Aviani Digital attacks are more and more frequent, and the first step in securing your app is understanding the threats and how to counter them. Threat modeling is an approach that analyses the security of an application. It is a structured ...DiscussApplication Security