This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We think you should publish your threat model, and we’re publishing our arguments. At ThreatModCon, I gave a talk titled “Publish Your Threat Model!” In it, I discussed work that Loren Kohnfelder and I have been doing to explore the idea, and today I want to share the slides and an essay form of the idea. We invite comments on the essay form, which is the most fleshed out.
But what about the essence and beauty? Recently, friends at IriusRisk told me about someone who was really focused on the “beauty and essence of threat modeling” when done by smart people at a whiteboard. That person was skeptical about automation, because it threatens that beauty. And the first thing I want to say is: my friend, I feel you. When a threat modeling session really comes together, there’s a magic to the chance to connect, teach, learn, and influence.
Andor teaches us about insider threats This post has spoilers for Season 2 of Andor, some lessons we can take for cybersecurity, and some thoughts on the writing process and drama. In Episode 10, we learn that Lonni has had Dedras access cert for a year, and in Episode 11, we learn about how hes been using it. We dont learn how he got it, but when questioned, Dedra denies having given it to him (and theres little reason to think she would have).
Free training for displaced government employees US Government employees (and former employees) are going through a lot of chaos. Many of our colleagues, collaborators, and friends are out of work suddenly and unexpectedly. At Shostack + Associates, we cant fix that. But we can offer something concrete. In times of uncertainty, we focus on what we know, and what we know is threat modeling and how to teach it.
Blackhat earlybird prices end Friday May 23; training prices will go up by about 10%. Blackhat is the primary place we encourage people to join us for open trainings. And if you plan to be there, why not register today? Adam is one of the many great trainers who'll be training at Blackhat USA, Aug 2-3 or 4-5.
Think like a what??! Theres an amazing moment of dialog in Andor: Luthen: Youre thinking like a thief! Andor: Im thinking like a soldier! Luthen: I need you to think like a leader! Now, maybe this just hit me because of my own rebellion against think like an attacker, but I think its a great small bit. Luthen doesnt explain how a leader thinks, but then, many leaders dont know how leaders think.
Get one fourth off for May the fourth! In Andor, Imperial Security Bureau supervisor Dedra Meero spends a lot of time thinking about how shed steal highly sensitive Imperial hardware and explaining how shed never climb the same fence twice. But her analyses dont convince her fellow ISB officers. Trying to get into your opponents head is tricky. but frankly, the problem is: For the show to work, she has to lose.
Threat modeling. So much threat modeling, and so much more, including foreshadowing of new rules from FDA. Threat Modeling Threat Modeling Connect has new in person groups. Theres a new human harms focused threat modeling approach, covered in an academic paper, Threat Me Right: A Human HARMS Threat Model for Technical Systems. Linwood Jones and Pawan Suresh blogged about Scaling Your Threat Modeling Program using GenAI at Adobe.
A great, in depth series on threat modeling with ATTACK Tiffany Bergeron is Chief Architect at MITREs Mappings Program. We did a four part series, diving deep into threat modeling using ATT&CK. This is a deeper insight into the set of conversations that Kyle Wallace and I previewed at an RSAC Virtual Seminar: Building Resilient Systems (our video starts here.
Whats next for the CVE program? Since last weeks CVE budget kerfuffle , Ive been drawn into many conversations about what comes next? And while I want to say that I dont know and I havent been involved in too long, it turns out I have a perspective that I keep sharing. To summarize: Decide what problem youre solving. Since I wrote my post, CISA has made a strong statement : To set the record straight, there was no funding issue, but rather a contract administration issue that was resolved prior
Pray they dont alter the price any further Neowin has a promotion in which theyre giving away my Threats: What Every Engineer Should Learn from Star Wars. (They also have Tanya Jancas new Alice and Bob Learn Application Security and more.) I know, he said never tell me the odds, but the odds of the price going any lower are approximately 3,720 to 1!
CVE funding is apparently not being renewed. I havent been operationally involved for a long time and Im sorry for what the team is going through. Im not alone in having strong feelings, and I want to talk about some of the original use cases that informed us as we set up the system. (You might also enjoy my thoughts on 25 Years of CVE for some context.
What's wrong with this process? Appsec leaders come to me all the time, looking for feedback on their threat modeling approach. When we do it for a customer, the request and response are private, and when they're not, sometimes they end up in the blog. A recent request exemplified a couple of the problems that we see over and over: The system model provides a framework for identifying and analyzing potential threats by thoroughly describing the assets, attributes, and their interactions with
Troy Hunt has a good post about being phished. Good on Troy for being transparent, and he talks about being tired and jet lagged, and that deserves sympathy. Attackers are sneaky. Troy honorably admits that he overrode 1Password and filled out the phishing site. In this post, I want to share why I think I wouldnt fall for this, even jet lagged. That defense is intensive sorting into folders, enabled by custom email addresses.
Big news for LLMs in threat modeling! Threat Modeling Matthew Adams introduced TM-Bench The World's First LLM Threat Modeling Benchmark. Im glad to see this, testing and evaluation is important. Tony Lee has released DeepTM , a tool for chaining threat models. (Tony was nice enough to help me find the core code for the agents.) As a general comment on these systems, LLMs are tremendously reactive to very small wording changes.
Grateful to introduce the Hackers' Almanack! I wrote the introduction for The DEF CON 32 Hackers Almanack ! Every year, thousands of hackers converge in Las Vegas for a joyous, crazy exploration of the edges of technology otherwise fondly called Hacker Summer Camp. They include many communities with different perspectives, all with a core commitment to hacking and exploration.
A group of us have urged HHS to require better handling of security reports A group of us have urged HHS to require that health care providers to act on (and facilitate reporting of) security issues by good faith cybersecurity researchers. The core of what we recommend is that HHS should require cooperation with Good Faith researchers. All regulated entities should be required to enable people to report security issues in a way thats easy to discover and aligned with standards.
Register for OWASP training in Barcelona! If youre based in the EU and have been waiting to participate in Adam Shostacks Threat Modeling training, the wait is over Shostack + Associates will be delivering training at OWASP Global AppSec in Barcelona! This in-person training will be taking place live from May 27-28, 2025. The conference will be held from May 29-30, 2025.
Adam was on the Medical Device Cybersecurity podcast Im excited to share that I recently spoke with the Cyber Doctor on the Medical Device Cybersecurity podcast! Whether youre an engineer, security professional, or product leader, this discussion may help you refine your approach to building secure systems efficiently. In the episode, we tackled three key qualities of threat modeling: how to make application design actionable, scalable, and practical.
Adam was on the CyberTuesday podcast I recently had the pleasure of joining Simon Whittaker on the CyberTuesday podcast for a wide-ranging discussion about threat modeling and organizational culture. I wanted to share some key themes we explored. One of the core messages I emphasized is how we can make threat modeling more accessible. If youve read my recent blog post on Hoarding, Debt and Threat Modeling , youll hear me reiterate how people often try to model everything at once and get overwhel
BlackHat invites human factors work Blackhat 2024 will be August 6-7 in Las Vegas, The call for papers is open, and will close on April 2. (Please check all dates in the official CFP.) As a member of the BlackHat Review Board, Im responsible for the Human Factors track. Over the last decade, weve developed a good track with a wide variety of content.
An exciting new sample TM from MITRE For Threat Model Thursday, I want to provide some comments on NIST CSWP 35 ipd, Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow (Initial Public Draft). As always, my goal is to offer helpful feedback. This is a big, complex document. Its 50 pages of real content with 13 listed authors, and is a subset of a larger project.
The psychology of getting started threat modeling During a recent threat modeling course, one of our students, Aleksei*, made a striking comparison that resonated with a lot of us: starting security analysis is like tackling a hoarders house. That visceral image of looking at mountains of accumulated issues, feeling overwhelmed by where to begin, captures a challenge many engineering leaders face when they first attempt to systematically assess their systems security.
Our comments on the National Cyber Incident Plan Josiah Dykstra and I have some comments on the National Cyber Incident Response Plan updates. Building on our recent paper about pandemic-scale cyber events , we submitted 14 recommendations to further improve the plan. We share the desire for proactive plans that adequately prepare the Nation for cyber incidents.
Do diagrams leverage the brain in a different way? Creating, refining, communicating, and working with models are all important parts of how I think about answering what are we working on? People often want to eliminate the diagramming or modeling step as not required, and thats a mistake. The act of engaging with the higher order question of what are we building working on is important, and diagramming acts as a forcing function.
An important step towards cyber public health Every four years, the Computing Research Association publishes a set of Quadrenial papers that explore areas and issues around computing research with potential to address national priorities. The white papers attempt to portray a comprehensive picture of the computing research field detailing potential research directions, challenges, and recommendations.
I had planned to start 2025 with a more positive note, but the loss of Amit Yoran, who was only a few years older than me, has hit me hard. I first met Amit at a Computers, Freedom and Privacy conference in the early 90s. He was in his West Point uniform, which was not typical for attendees of the conference. So I went over and struck up a conversation, and we continued over probably 30 years.
What should hackathon judges value? The Threat Modeling Connect team has built a hackathon thats gotten a lot of enthusiastic participation over the last few years. Today I want to discuss the design of that hackathon, talk about an effect of the design and ask if we can do something different. None of this is intended to critique the organizers, participants or judges.
My talk at JPL Before Thanksgiving, I was in Southern California, and I was honored to be able to give a talk at the Jet Propulsion Lab. The talk is titled Threat Modeling: Engineering and Science. The first part of the talk puts threat modeling in context for engineering secure systems, while the second part considers why we do what we do and asks some questions about how we think about risk.
Why do we call them trust boundaries, anyway? This blog post is more questions and musings than answers. Back in September, there was a fascinating Propublica article, Microsoft Chose Profit Over Security. It includes a link to Microsoft Security Servicing Criteria for Windows , which uses the term security boundary where Id normally say trust boundary.
In late 2024, people are being offered a choice of features versus security. This week, Synology released a security patch (for Synology Photos, a default part of some of their products) without telling anyone. When I went to install it, I learned that the security update comes with mandatory disabling of video conversion for H.264/265*. Now, its possible that the bugs that the researchers found led Synology to find that the libraries they were using were a wretched hive of vulnerabilities, and
If you say liability three times, it appears! Secure by Design, threat modeling and appsec Loren Kohnfelder wrote a longish, excellent post Flaunt your threat models. Weve been talking about this, and I think flaunting models at the level of the one released by Curl make so much sense its hard to see why its not standard. Google has released information on their Secure by Design commitment, including a blog and white paper.
Some thoughts on 25 years of the CVE program I saw the headline CVE Program Celebrates 25 Years of Impact! and want to congratulate everyone involved. The 25th anniversary report was a nostalgic walk down memory lane for me. I remember sitting a row or two behind Dave Mann and Steve Christey Coley at the workshop on vulnerability databases, and wondering who the heck MITRE was and why they cared?
Threat model Thursday, let's dive deep into a detailed approach to using ATT&CK For Threat Model Thursday, lets look at Threat Modeling with ATT&CK from the Center for Threat Informed Defense at MITRE. As always with Threat Model Thursday, my goal is to respectfully engage with interesting work and ask what we can learn from it. This one is particularly interesting because Ive been teaching threat modeling with kill chains, including ATT&CK, for many years.
Time to vote for OWASP leadership The OWASP 2024 board elections are open. OWASP has outsize influence over application security. Its a go-to authoritative source, many of its projects are recognized in international standards, and more. And the election videos have fewer than 100 views each. As an OWASP member and supporter (even though Im sometimes critical), I encourage anyone who reads this blog to join and get involved in making the organization better.
If you say threat modeling three times, it appears! If you say threat modeling three times, it appears! This months roundup focuses on recent in-depth threat modeling work, including academic papers, an Amazon white paper, and more. Also, exciting news from Shostack + Associates. There was less in AI, appsec or regulation that jumped out as worthy of rounding up.
The most important stories around threat modeling, appsec and secure by design for August, 2024. Threat Modeling Brett Crawley released Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture , published by Packt, a full book on the game. Awesome! (I was honored to write the Foreword.) In a blog post at Forbes, Zak Doffman discusses a New Warning As Spike In GPS Spoofing Attacks Hit Passenger Planes , citing a rise from 200 daily incidents to 900 in Q2
The failure to secure boot keys should be a bigger deal. In case you missed it, Ars Technica has a story, Secure Boot is completely broken on 200+ models from 5 big device makers. The key* point is that Keys were labeled "DO NOT TRUST." Nearly 500 device models use them anyway. At some level, I get it. Theres a lot of work to do in shipping a big complex system, even if that big complex system is in a small form factor.
A new paper on 'Pandemic Scale Cyber Events Josiah Dykstra and I have a new pre-print at Arxiv, Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19. The abstract is: The devastating health, societal, and economic impacts of the COVID-19 pandemic illuminate potential dangers of unpreparedness for catastrophic pandemic-scale cyber events.
You should get the Threat Modeling Gameplay book, now available! One of the challenges in creating a game with a purpose is balancing fun and pedagogy (or even pedantry). Cards in my Elevation of Privilege game have specific hints, more specific than the threats that are used as the suits.but sometimes not specific enough. Thats why Im so pleased that Brett Crawley has written a book, Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture.
Podcast episode with Venkat Ramakrishnan discussing the intersection of GenAI and threat modeling Earlier this year, Adam had the opportunity to speak with Venkat Ramakrishnan on his show Software Testing and Quality Talks". In this episode, Adam and Venkat discuss the ever hot topic of GenAI. Whether you work in quality assurance or app sec, this episode may still be relevant to you.
Google calls attention to our Cyber Public Health work Last week, Bill Reid and Taylor Lehmann, both in the Office of the CISO at Google Cloud, wrote a blog post, Cyber Public Health: A new approach to cybersecurity. The post makes the case that the approach is important, and ties it to the recent work about Cyber-Physical Resilience by the Presidents Council of Advisors on Science and Technology.
The most important stories around threat modeling, appsec and secure by design for June, 2024. Threat Modeling The City of London police report that a homemade mobile antenna was used to send thousands of smishing messages Ive been skeptical of phone system security, but this is both important if youre trusting the phone system, as an example of an evolving threat, and really funny.
Why is it hard to count lockbit infections? I was surprised to see the headline FBI recovers 7,000 LockBit keys, urges ransomware victims to reach out. I didn't think there were that many victims. Some somewhat lazy searching reveals: CISA (with other agencies) said 1,700 in Understanding Lockbit (June, 2023) Department of Justice said more than 2,500 victims in U.S.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content