This is Adam Shostack’s threat modeling blog series, as a single document.
Anatomy of a Breach: How Hackers break in
Did you know that an attacker can be present on a network for more than … Read more »
New SDL Pro Network Members: SANS and SAIC
When I joined the SDL team last fall, the SDL Pro Network had launched as … Read more »
Recycle an old PC
It’s human nature to want the newest of the new, especially when it comes to … Read more »