Secure Coding mailing list archives
Top 5 Reasons to Implement Threat Modeling
From: Reef Dsouza <reeftim () gmail com>
Date: Wed, 26 Jun 2013 10:52:36 -0400
Hi Secure Coders, As always, the Verizon Data Breach report highlighted some interesting stats on attacks and breaches over the last year. And, no surprise that hacking accounts for a high chunk of those attack vectors, with SQL Injection still prominent. In order to build software securely, we cannot stress enough the importance of proactively threat modeling applications and we’ve identified 5 of the top reasons to do so. Avoiding a single breach is a good enough reason alone to implement threat modeling but hey, for you skeptics out there, we've compiled a handful of other key considerations as well. Here's the blog post: http://myappsecurity.com/5-reasons-threat-modeling/ Please take a look – any and all feedback is welcome! Thanks, Reef Dsouza Product Manager MyAppSecurity <http://www.myappsecurity.com/> LinkedIn <http://www.linkedin.com/in/reefdsouza>
_______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
Current thread:
- Top 5 Reasons to Implement Threat Modeling Reef Dsouza (Jul 01)