This is Adam Shostack’s threat modeling blog series, as a single document.
Sharing Cloud News and Perspectives in Asia
Today I’m heading off to Asia. Over the next few weeks I’m looking forward to … Read more »
Trust in Computing Research: 1 : Computing and the Internet
As you may have read in the introduction Jeff Jones posted recently, we undertook the … Read more »
Security professionals and researchers trade ideas at BlueHat
The Microsoft BlueHat conference is a semi-annual event that brings together internal Microsoft security professionals … Read more »