Birds of a Feather sessions at ThreatModCon 2023
|
|
2
|
6
|
July 6, 2023
|
Join the Threat Modeling Revolution: The Inaugural Threat Modeling Conference is Here!
|
|
0
|
6
|
July 6, 2023
|
Using LLMs to help lead threat modeling sessions
|
|
3
|
13
|
July 5, 2023
|
Call For Papers: Threat Modeling Conference 2023
|
|
0
|
3
|
June 1, 2023
|
Attacker Knowledge? Why?
|
|
4
|
3
|
May 19, 2023
|
π Meet the Winners of Our Spring 2023 Hackathon!
|
|
0
|
6
|
March 31, 2023
|
Thatβs a wrap! π Our first threat modeling hackathon!
|
|
0
|
6
|
March 31, 2023
|
Spring 2023 Hackathon in Full Swing!
|
|
0
|
4
|
March 1, 2023
|
Threat Modeling Hackathon Spring 2023 Guide
|
|
0
|
4
|
February 13, 2023
|
Versioning use cases
|
|
3
|
3
|
February 7, 2023
|
Article share: Threat Modeling in the Age of OpenAI's Chatbot
|
|
2
|
8
|
December 22, 2022
|
OSCAL: the Open Security Controls Assessment Language for IriusRisk
|
|
3
|
6
|
December 20, 2022
|
Example Software Supply Chain Threat Model
|
|
0
|
18
|
December 20, 2022
|
Is there value in doing threat modeling even for existing applications?
|
|
0
|
7
|
November 19, 2022
|
Threat Modeling of products that are based on internal "platforms"
|
|
0
|
5
|
October 28, 2022
|
Papers we love - TM selection
|
|
0
|
12
|
October 20, 2022
|