Michael Nagenborg (he/him) · @mnagenborg
121 followers · 31 posts · Server social.edu.nl

I am also happy to share a pre-print of our joint paper on for in the . This one of the less philosophical papers within our interdisciplinary project, but really helpful for us to discuss in geospatial . preprints.org/manuscript/20230

#threatmodelling #geodata #humanitariancontext #bias #ai

Last updated 1 year ago

Gary McGraw · @cigitalgem
485 followers · 641 posts · Server sigmoid.social

Will be chatting at LJC JUG webinar tonight from 18:00 GMT!

Know Your Threat and Model it! Why it's important for developers to know and help with it (it's not just because of legislation), but also what ways we can make this more productive for you!

eventbrite.co.uk/e/ljc-know-yo

#java #jug #londonjug #threatmodelling #cybersecurity #threats #vulnerabilities

Last updated 2 years ago

Gary McGraw · @cigitalgem
473 followers · 559 posts · Server sigmoid.social

I had a blast with the Irius Risk North American crew, talking

Time to automate the finding of security flaws at the architecture level!

#softwaresecurity #swsec #appsec #threatmodelling

Last updated 2 years ago

Tim Brown :donor: · @timb_machine
622 followers · 881 posts · Server infosec.exchange

Airport seemed fine with all the electronics, which is interesting as we're doing a couple of Threat Modelling Assessments for the transport sector at moment.

#notcurrentlyconsideredadversary #threatmodelling

Last updated 2 years ago

Tim Brown :donor: · @timb_machine
612 followers · 868 posts · Server infosec.exchange

ATT&CK navigator is a good way to bootstrap threat models if you don't have dedicated tools.

1) Filter on the platforms you care about
2) Browse through the techniques looking for one that likely affect you
3) Colour code them
4) Annotate them with comments
5) Add meta-data and links to 3rd party resources
6) Score them

Save the STIX and mangle as desired e.g. I have some Python that draws directed graphs by exporting JSON into a format that Gephi can consume.

&ck

#att #threatmodelling

Last updated 2 years ago

seismographix · @seismographix
82 followers · 937 posts · Server det.social

Why not apply the principles of and to secure in software or ?

What “social targets” should be secured against what kind of attack vectors and malicious actors?

Then maybe we can evaluate the ways to use quoted posts as attack vectors on social safety and how to prevent them.

@atomicpoet

#threatmodelling #CommonCriteria #socialsafety #socialmedia #mastodon

Last updated 2 years ago

Stuart Alexander · @redstar
12 followers · 10 posts · Server infosec.exchange

I would have thought that the govt’s would have resulted in a policy of ‘senior officials not to travel together in a war zone’. Given the propensity of helicopters to drop out of the sky, even without a war, I would have assumed rules were in place…

#ukraine #threatmodeling #threatmodelling #UkraineWar

Last updated 2 years ago

Stuart Alexander · @redstar
12 followers · 10 posts · Server infosec.exchange

I would have thought that the govt’s would have resulted in a policy of ‘senior officials not to travel together in a war zone’. Given the propensity of helicopters to drop out of the sky, even without a war, I would have rules in place…

#ukraine #threatmodeling #threatmodelling

Last updated 2 years ago

Fenjan🦖 · @fenjan
2 followers · 83 posts · Server sigmoid.social

date: 2023-01-10 15:53:40
by: Kostas

Fully funded position researching on and towards augmenting in and . Closing date on 19/2/23. Candidates apply at t.co/Sr660eUPS2. Contact me if interested!

🐦🔗: twitter.com/twitter/statuses/1

#phd #causalinference #machinelearning #decisionmaking #threathunting #threatmodelling #phdPosition

Last updated 2 years ago

N/A · @c3yhun
4 followers · 23 posts · Server infosec.exchange

All models are wrong, but some are useful
- George E. P. Box

…and some models are measurably more useful
- Doug Hubbard

#threatmodelling

Last updated 2 years ago

Alex · @alexlomas
207 followers · 15 posts · Server infosec.exchange

I don't know if is a thing, but what the hell:

I started the year with an embedded job with @cybergibbons - a curious device with some interesting findings.

I looked at quite a few consumer-grade routers. Some were bad, some were good.

I did a few and consultancy engagements which I enjoyed a lot. I liked the freedom of communication.

I went to and - I even got to speak at the (slightly terrifying) and did around 300 landings in our flight sim with my amazing colleagues and people who queued for ages to have a go! I did a video for it too! youtube.com/watch?v=6DHi-qC1jw

I got finally :(

I did quite a few jobs, I actually enjoy them.

I met with my lovely colleagues in person more than last year.

I had an amazing time at sea with @cybergibbons on a whole-ship maritime job. Hard work but very satisfying, and hope to do more of those.

Early next year I'll be speaking at in London.

Most of all for I'll be making a better personal v work balance and look forward to seeing friends and doing more fun stuff.

Cheers 🥃​

#yearininfosec #avionics #threatmodelling #rsa #defcon #aerospacevillage #COVID #cyberessentials #sans #2023goals

Last updated 2 years ago

· @tant
6 followers · 97 posts · Server nrw.social

Ok if you do threat modelling how do you document the threats you found?
Issue manager? Text document? Reports? Exel?
Followup, how do you keep track of the mitigations?
I'm asking for a friend. :mastohalo:


#threatmodelling #threatmodeling

Last updated 2 years ago

Gary McGraw · @cigitalgem
348 followers · 165 posts · Server sigmoid.social
noplasticshower · @noplasticshower
225 followers · 1234 posts · Server zirk.us

On February 7th @adamshostack is releasing a new book:

“Threats: What Every Engineer Should Learn From Star Wars”

I just ordered mine. :-D

amzn.to/3u0dj81

#threatmodeling #threatmodelling

Last updated 2 years ago

Megan · @neonskog
57 followers · 66 posts · Server infosec.exchange

You know what I wasn't ready for at 10 am on a Monday.. a mock threat modelling session. My coffee had barely even kicked in. Also why do I have such a mental block with these? As a former business sys analyst and visual mapper you'd think this would be easy for me. :ablobcatderpy:

#appsec #appsecproblems #threatmodelling #threatmodeling

Last updated 2 years ago

Dan Conn · @danjconn
554 followers · 11 posts · Server hachyderm.io

OK time for this one!

Hey I'm Dan Conn and I've been a software developer for just over 10 years, with a strong interest in cybersecurity for just as long.

Professionally I'm interested in , , , , and

I like to do talks, hack, code, run and also love making music and listening / dancing to it too ❤️

Come say hi!

#hachyderm #java #python #SecureCoding #SoftwareSupplyChains #threatmodelling #OSINT4Good #pentesting #appsec #cryptography #introductions #introduction

Last updated 2 years ago

cygnetix :unverified:​ · @cygnetix
401 followers · 136 posts · Server infosec.exchange

@Skittl3z @salp @jerry if you do end up going down the path of doing some for , I'd be really interested to see something in the format of a security decision tree, showing risks and mitigations, similar to the process here: kellyshortridge.com/blog/posts

#threatmodelling #mastodon

Last updated 2 years ago

fihu · @fihu
628 followers · 7335 posts · Server norden.social

"Threat modelling case study: bicycles"
calpaterson.com/bicycle-threat

(dt. "Gefahrenmodellierung") describes the process of evaluating different threats on your [thing], here: your bicycle (dt. "G. ist die Beurteilung verschiedener Gefahren für dein [Ding], hier dein Fahrrad")

CC @mastobikes@gup.pe

#threatmodelling #mastobikes #noxp

Last updated 4 years ago