Threat Modeling: detecting threats before coding

Comments

Comments are closed.

Excellent talk which introduced me to this area for the first time. I really liked how the speaker used a 'case study' to walk us through a basic TAM. I'll definitely be using this tool in the future.