article thumbnail

Secure by Design roundup - March 2024

Adam Shostack

CISA has released their secure software attestation form , which means the 90 day clock is ticking. Application Security Interesting post: The most important goal in designing software is understandability. Threat Modeling People are raving out our new whitepaper on Inherent Threats! Press release , technical report.)

Software 130
article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

This is why I included interpersonal factors in the Jenga whitepaper.) On the other side is a whiteboard with a software architecture diagram We all have too many tasks, and those where you cant imagine success, or where success seems not worth the price, are ones we want to skip.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Taming the Wild West of ML: Practical Model Signing with Sigstore

Google Security

We have seen remarkable progress leading to weekly launches of various applications which incorporate ML models to perform tasks ranging from customer support, software development, and even performing security critical tasks. With the advent of LLMs, the ML field has entered an era of rapid evolution.

Risk 92
article thumbnail

Whitepaper: OVERCOMING THE LIMITS OF LEGACY DETECTION TOOLS IN TODAY’S THREAT LANDSCAPE WITH ADVANCED AI

Security Boulevard

Security tools such as antivirus software and firewalls have long been the stalwarts of cyber defense, forming the bedrock of protection for organizations worldwide.

article thumbnail

Chuck, Acme, and Remediation Avoidance

Adam Shostack

Lets look at what happens if Acme gives Chuck some free resources, like our Fast, Cheap and Good: An Unusual Tradeoff Available in Threat Modeling whitepaper. It has an employee base of 50,000 to 100,000; the software security group consists of 50 security architects and 150 security champions. Gravity is a coyotes natural enemy.

article thumbnail

CyGlass Makes the Case for SaaS Network Detection and Response

Security Boulevard

LITTLETON, Mass, April 14, 2021 – CyGlass makes the case for a renewed focus on Network Detection and Response (NDR) as a foundational defensive component to stop ransomware and other targeted attacks in its new whitepaper titled “NDR SaaS: What it Can Do for You.”

article thumbnail

Understanding Changing Software Delivery Trends and Key Strategies for Growth

Thales Cloud Protection & Licensing

Understanding Changing Software Delivery Trends and Key Strategies for Growth. State of Software Monetization 2022. The software and software-driven device industry is evolving at breakneck speed, and the stakes have never been higher for software and device vendors entering 2022. Automated software updates.