mailing list archives
Top 5 Reasons to Implement Threat Modeling
From: Reef Dsouza <reeftim () gmail com>
Date: Wed, 26 Jun 2013 10:52:36 -0400
Hi Secure Coders,
As always, the Verizon Data Breach report highlighted some interesting
stats on attacks and breaches over the last year. And, no surprise that
hacking accounts for a high chunk of those attack vectors, with SQL
Injection still prominent.
In order to build software securely, we cannot stress enough the importance
of proactively threat modeling applications and we’ve identified 5 of the
top reasons to do so. Avoiding a single breach is a good enough reason
alone to implement threat modeling but hey, for you skeptics out there,
we've compiled a handful of other key considerations as well.
Here's the blog post: http://myappsecurity.com/5-reasons-threat-modeling/
Please take a look – any and all feedback is welcome!
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
- Top 5 Reasons to Implement Threat Modeling Reef Dsouza (Jul 01)