About the Discussions category
|
|
0
|
4
|
May 20, 2025
|
Understanding "Add Threat" Screen – Project vs. Component Threats, Use Case & Integration with Risk Library
|
|
4
|
39
|
July 14, 2025
|
Essential / TL;DR / Take Home Message Threat Model
|
|
0
|
19
|
July 10, 2025
|
Does AI do a better job?
|
|
5
|
30
|
July 2, 2025
|
Free training for displaced Federal workers
|
|
0
|
37
|
July 1, 2025
|
Threat Mod Con 2025 DC - Call for Papers?
|
|
3
|
19
|
June 30, 2025
|
No need to fear the clouds. Play OWASP Cumulus!
|
|
0
|
16
|
June 26, 2025
|
From AWS "Accelerate threat modeling with generative AI"
|
|
0
|
26
|
June 23, 2025
|
Gamification for threat modeling of machine learning
|
|
1
|
37
|
June 13, 2025
|
Meet ThreatPad!
|
|
22
|
376
|
June 11, 2025
|
What should we model next year?
|
|
4
|
76
|
June 1, 2025
|
AI Agent threat modeling - MAESTRO
|
|
0
|
43
|
May 23, 2025
|
Announcing CyberSec Games!
|
|
4
|
81
|
May 23, 2025
|
OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling
|
|
0
|
29
|
May 20, 2025
|
Attack Trees + Attack Defense Trees
|
|
1
|
64
|
May 19, 2025
|
Do you need a new set of eyes or perspective?
|
|
3
|
46
|
May 10, 2025
|
May 2025 Challenge: Automating Threat Mitigation Validation
|
|
0
|
38
|
May 6, 2025
|
How to threat model IAM / AuthN+AuthZ?
|
|
7
|
133
|
May 4, 2025
|
April 2025 Challenge: What Should an Internal Threat Library Include?
|
|
8
|
148
|
April 27, 2025
|
Team 7's Hackathon 2025 Journey: A Winner's Perspective
|
|
2
|
82
|
April 27, 2025
|
Threat Modeling with ATT&CK
|
|
0
|
25
|
April 26, 2025
|
Visualizing attack trees
|
|
9
|
317
|
April 26, 2025
|
🌟 Most awesome risk assessment style?
|
|
5
|
114
|
April 24, 2025
|
Creation of a New Chapter in the UK......Interested?
|
|
3
|
42
|
April 18, 2025
|
From Interviews to DFDs
|
|
0
|
29
|
April 15, 2025
|
How can TM bring design and operations together?
|
|
8
|
57
|
April 3, 2025
|
Threat driven scope or scope driven threats?
|
|
7
|
83
|
March 25, 2025
|
What are the AI use cases for threat modeling?
|
|
2
|
73
|
March 16, 2025
|
March 2025 Challenge: Describe Your Threat Modeling Process in 3 Sentences (or Less)
|
|
17
|
185
|
March 15, 2025
|
Use of AI code scanning to automate verification of Threat model mitigations
|
|
0
|
38
|
March 14, 2025
|