Browse by Tags

Tagged Content List
  • Blog Post: Note to Fannie Mae: Dealing with Logic Bombs

    Today, it was revealed that a departing contractor left Fannie Mae with a parting gift – a Logic Bomb designed to take 4000 of the financial giants servers & their data. Since this news broke, a number of concerned CIOs have requested my team for some guidance on how to deal with logic bombs. So...
  • Blog Post: Threat Modeling – Sanity Check List

    Hi, I am Sagar Joshi and I work with the ACE Services Team. There is a lot of awareness building around TAM – Threat Analysis and Modeling tool developed by ACE. I have come across practitioners from various disciplines who want to start doing threat modeling to get an idea about the possible threat...
  • Blog Post: S E C U R E Acrostic

    S eamless The more integration work that has to be done to get a component to work, the more opportunities to introduce unintended errors which can result in security vulnerabilities. Secure code should therefore not require any special skills to incorporate. It should just be the normal way of doing...
Page 1 of 1 (3 items)