Home page logo

securecoding logo Secure Coding mailing list archives

Top 5 Reasons to Implement Threat Modeling
From: Reef Dsouza <reeftim () gmail com>
Date: Wed, 26 Jun 2013 10:52:36 -0400

Hi Secure Coders,

As always, the Verizon Data Breach report highlighted some interesting
stats on attacks and breaches over the last year.  And, no surprise that
hacking accounts for a high chunk of those attack vectors, with SQL
Injection still prominent.

In order to build software securely, we cannot stress enough the importance
of proactively threat modeling applications and we’ve identified 5 of the
top reasons to do so. Avoiding a single breach is a good enough reason
alone to implement threat modeling but hey, for you skeptics out there,
we've compiled a handful of other key considerations as well.

Here's the blog post: http://myappsecurity.com/5-reasons-threat-modeling/

Please take a look – any and all feedback is welcome!


Reef Dsouza
Product Manager
LinkedIn <http://www.linkedin.com/in/reefdsouza>
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates

  By Date           By Thread  

Current thread:
  • Top 5 Reasons to Implement Threat Modeling Reef Dsouza (Jul 01)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]