What is / are the best threat modeling method(s) for container security?

I am currently researching threat modeling for container security, I am wondering which methods are the best for container security. Till now I got the conclusion that STRIDE is most used and it is used as well for container security becau… Continue reading What is / are the best threat modeling method(s) for container security?

IT security audit : is threat modelling key to reproducible success of just following a methodology (ex : ethical hacking)

To sum up the methodology of ethical hacking, what you do is :

Information gathering (gets the IP, domains, etc…)
Fingerprint the IP (what OS, what services are running, etc…)
Vulnerability assessment (are any services or vulnerable … Continue reading IT security audit : is threat modelling key to reproducible success of just following a methodology (ex : ethical hacking)

Threat Modeling Application Released By OWASP: Threat Dragon 1.0

OWASP Threat Dragon!
Big News in the Threat Modeling racket: OWASP has released version 1.0 of it’s highly awaited threat modeling platform as a free, open source and cross-platform tool. Monikered OWASP Threat Dragon, installers have been built, the … Continue reading Threat Modeling Application Released By OWASP: Threat Dragon 1.0

Are password managers the best way to achieve identity compartmentalization online?

I’ve been using a well-known password manager to create several identities for use on each web service I sign up to.

I had the idea of creating 3+ email addresses with strong passwords consisting of 40+ random characters and signing up on… Continue reading Are password managers the best way to achieve identity compartmentalization online?