Remove category threat-modeling-book
article thumbnail

Digital Risk Types Demystified: A Strategic Insight into Online Threats

Centraleyes

The Importance of Technology in Business Flexibility and Adaptability Embracing digital technology allows businesses to adapt their models to market changes. This section seeks to objectively explore specific categories of digital risks, unraveling strategic approaches to mitigate them effectively.

Risk 52
article thumbnail

Reflective Practice and Threat Modeling (Threat Model Thursday)

Adam Shostack

Lately, I’ve been asking what takes threat modeling from a practice to a mission. If you’re reading this blog, you may have seen that some people are nearly mad about threat modeling. The ones who say “you’re never done threat modeling.” Real threat models.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Roundup August 2023

BH Consulting

Privacy progress: Dr Valerie Lyons’ book publication and award nomination Congratulations to BH Consulting chief operations officer Dr Valerie Lyons, who will become a published author later this year. Her book, “The Privacy Leader Compass” is available to pre-order from 1 November.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. I can dream about being different because there are white male role models. model, but you know, that's men. Around 2014 Chenxi authored a blog , which was very important for the industry in my opinion.

InfoSec 40
article thumbnail

SOC vs MITRE APT29 evaluation – Racing with Cozy Bear

McAfee

However, as all practitioners know, cyber defense is more complicated than what raw data can express, especially when dealing with sophisticated threat actors. The principles enumerated in Schwartau’s book are essential for any blue teamer, regardless of whether you are a CISO, a SOC analyst, a security architect or an incident responder.

CISO 55