Browse by Tags

Tagged Content List
  • Blog Post: Updated SDL Tools Available

    Hello all, Today we are excited to announce that some enhancements have been made to three of our free Security Development Lifecycle (SDL) tools - Threat Modeling, MiniFuzz, and RegExFuzz. As many of you know, tools can be an invaluable asset when it comes to implementing a Security Development...
  • Blog Post: Application Security: 2011 & Beyond – A Forrester Research Report

    Hi All. Doug here, In April 2011 Forrester Research wrote a new study on Application Security. This study, titled Application Security: 2011 & Beyond led by Dr Chenxi Wang, Lead Analyst at Forrester Research, provides valuable research, insights and recommendations for security and risk professionals...
  • Blog Post: Make Your Own Game! (My BlueHat lightning talk)

    Adam Shostack here.  At the end of BlueHat v10 , I gave a 5 minute talk on Elevation of Privilege. I didn't have a slide deck, but rather a card deck, and so wanted to blog what I'd said and why it matters to those of you working to bring secure development to your organizations. Let me start with...
  • Blog Post: Black Hat 2010: Elevation of Privilege

    Hi, Adam Shostack here. I just wanted to let you know that I’ll be speaking at Black Hat about “Elevation of Privilege: The Easy Way to Threat Model.” Threat modeling is critical to secure development, and people find it intimidating and tough to get started. I will present Elevation...
  • Blog Post: Announcing Elevation of Privilege: The Threat Modeling Game

    What Adam Shostack here. I’m pleased to announce that at RSA this week, Microsoft is releasing Elevation of Privilege , the Threat Modeling Game. Elevation of Privilege is the easiest way to get started threat modeling . EoP is a card game for 3-6 players. Card decks are available at Microsoft’s RSA...
  • Blog Post: Ninjas are cool, but engineers build bridges

    Cory at Matasano has a new blog post explaining “Ninja threat modeling.” Ninja threat modeling is Matasano’s approach to threat modeling as part of a penetration test. I’m really happy that they’ve given their approach a name. A few years back, we would just talk about “threat modeling” and it got confusing...
  • Blog Post: "The Threats to Our Products"

    Adam Shostack here. I’ve learned to love STRIDE as a framework for thinking about threats, but it makes a lousy classification system. That is, I can look at a system to find information disclosure threats, but once I have an attack that leaks, say, the location of a DLL in memory to a remote...
  • Blog Post: Experiences Threat Modeling At Microsoft

    Adam Shostack here. Last weekend, I was at a Security Modeling Workshop, where I presented a paper on “ Experiences Threat Modeling at Microsoft ,” which readers of this blog might enjoy. So please, enjoy! And while I’m at it, I wanted to draw attention to some of the other presentations that I thought...
  • Blog Post: What do you want to know about SDL threat modeling?

    Adam Shostack here. I'm working on a paper about "Experiences Threat Modeling at Microsoft" for an academic workshop on security modeling. I have some content that I think is pretty good, but I realize that I don't know all the questions that readers might have. So, what questions should I try to...
  • Blog Post: Security Thoughts from TechEd 2008

    Hi, this week is a post from Michael Howard and Laura Machado de Wright, who both attended and presented at TechEd 2008 in Orlando the week of June 2 nd . First up is Laura. I have been a Security Program Manager for the last 3 years, working as a security advisor for a variety of products across...
  • Blog Post: SDL Threat Modeling: Past, Present and Future

    Adam Shostack here. I wanted to share my slides from the recent Layer One conference [link], where I talked about "SDL Threat Modeling: Past, Present and Future." There are a few points that I wanted to emphasize. The first is that I'm talking about threat modeling from the perspective of the...
  • Blog Post: SDL Threat Modeling @ ToorCon

    Adam Shostack here. I spoke at Toorcon this past weekend on "SDL Threat Modeling: Past, Present and Future." I wanted to share my slides to help clarify a bit about where SDL threat modeling is and why, and a bit about where we're going. (Click on the post title, and you'll see an attachment in...
  • Blog Post: Training People on Threat Modeling

      Adam Shostack here. Blogger Ian Grigg has an interesting response to my threat modeling blog series, and I wanted to respond to it. In particular, Ian says “I then would prefer to see the threat - property matrix this way:” I wanted to share an additional table from our training, and...
  • Blog Post: Wrapping up Threat Modeling

    One of the critiques of the threat modeling blog posts process is that it can seem interminable. And so, in this final post, I’d like to offer up some final thoughts on language, and cognitive load. Specification versus Analysis When Larry Osterman was writing about threat modeling , he casually...
  • Blog Post: Threat Modeling Self Checks and Rules of Thumb

    Adam again. I hope you’re still enjoying this as we hit #5 in the threat modeling series. In my last post, I talked about how almost everyone in software draws on whiteboards regularly, and this makes it an ideal first step. It’s an ideal first step because everyone can do it, see that...
  • Blog Post: Making Threat Modeling Work Better

    Adam Shostack here, with part four of my threat modeling series. This post is a little less philosophical and a lot more prescriptive than the one about flow. It explains exactly how and why I changed a couple of elements of the process. The first is the brainstorming meeting, and the second is the way...
  • Blog Post: Getting into the Flow With Threat Modeling

    Adam Shostack again, with the third in our series on threat modeling. In this post, I want to explain one of the ‘lenses’ that seemed to help us focus threat modeling, and how I’ve applied it. The concept of flow originated with Mihaly Csikszentmihalyi. It refers to a state where people are energetically...
  • Blog Post: The New Threat Modeling Process

    Adam Shostack here, with the second post in my series on the evolved threat modeling process. To summarize, what I’ve tried to achieve in changing the process is to simplify, prescribe, and offer self-checks. I’ll talk in the next post about why those three elements are so important to...
  • Blog Post: The Trouble with Threat Modeling

    Adam Shostack here. I said recently that I wanted to talk more about what I do. The core of what I do is help Microsoft’s product teams analyze the security of their designs by threat modeling. So I’m very concerned about how well we threat model, and how to help folks I work with do it better. I...
Page 1 of 1 (19 items)