Application Security

Top 5 Reasons to Implement Threat Modeling

Over the past decade, security awareness has increased, but so has the prevalence of powerful tools at the hands of amateurs and experts alike. Other highly prevalent attacks against web applications include cross-site scripting, cross-site request forgery and brute force … Read More

3 Approaches to Threat Modeling

Threat Modeling can be viewed in two different, but related contexts. One is the implementation of security controls by architects that map to security requirements and policy and the other is to reflect all possible known attacks to components or … Read More

Comparison of Threat Modeling Methodologies

Microsoft Threat Modeling Methodology: Stride Threat Model Microsoft’s threat modeling practice aligns with their Trustworthy Computing directive of January 2002 and its primary focus is to help ensure secure software begins during the design phase. In order for an application … Read More