threat modeling

Chess king left standing with other fallen pieces around it Choosing the Right Threat Modeling Methodology

Threat modeling‍ has transitioned from a theoretical concept into an IT security best practice. Choosing the right methodology is a combination of finding what works for your SDLC maturity and ensuring it results in the desired outputs. Let’s look at four different methodologies and assess their strengths and weaknesses.

Alan Crouch's picture
Alan Crouch