The evolution of a Threat Pattern

In an era of agile development and digital transformation, any application is subject to ongoing enhancement and improvement. Indeed, software engineering is a complex process with many interdependent tasks where multiple functions share responsibilities to strike a balance between software quality and business objectives, regardless of the specialized nature of the teams within the organizational…

The post The evolution of a Threat Pattern appeared first on Speaking of Security – The RSA Blog.

Continue reading The evolution of a Threat Pattern

Testing a Threat Pattern: Quality is Never an Accident

John Ruskin, one of the great visionaries of the 19th century, said “Quality is never an accident; it is always the result of intelligent effort”, in our continuing journey through the lifecycle of a threat pattern, we are now at the testing phase. After analyzing  requirements, asset and threats, designing a general and reusable model for the threat pattern and implementing the…

The post Testing a Threat Pattern: Quality is Never an Accident appeared first on Speaking of Security – The RSA Blog.

Continue reading Testing a Threat Pattern: Quality is Never an Accident

Why threat modelling and risk planning does not consider the sex of users?

Isn’t it scientifically proven that men and women have very different psychologies? So that, at least they must have different attitudes towards security policies and guidelines compliance. All of that must have affect on soc… Continue reading Why threat modelling and risk planning does not consider the sex of users?

Mastering the implementation of a Threat Pattern

In previous posts we have discussed two of the most critical phases in the “The Lifecycle of a Threat Pattern”: analysis and design. In the analysis phase the objective is to fully understand the asset in scope by getting deeper into the context to formulate a set of residual risks to which the asset might be…

The post Mastering the implementation of a Threat Pattern appeared first on Speaking of Security – The RSA Blog.

Continue reading Mastering the implementation of a Threat Pattern

Engineering The Design Of A Threat Pattern

In our journey of developing and maintaining threat patterns, we have now arrived at a critical phase: the design. While the need of an implementation phase is immediate as well as the evaluation of the background analysis in order to build something meaningful (as explained by my colleague, Demetrio Milea) – the intermediate design phase is the…

The post Engineering The Design Of A Threat Pattern appeared first on Speaking of Security – The RSA Blog.

Continue reading Engineering The Design Of A Threat Pattern