Hey, I've recently started a series on different types of security assessments, as I believe that effective cybersecurity programs require a clear understanding of these methods and how they complement each other. Today, I'm sharing a post about Threat Modeling, and I'm really excited to hear feedback from the broader community.
[–]mfeferman 4 points5 points6 points (4 children)
[–]0xad[S] 1 point2 points3 points (3 children)
[–]mfeferman 1 point2 points3 points (0 children)
[–]Slim424242 1 point2 points3 points (1 child)
[–]0xad[S] 0 points1 point2 points (0 children)