filmov
tv
Instant Threat Modeling - #15 Mobile Apps

Показать описание
This episode presents the most common threats applying to mobile apps.
Threat actors / threats:
- Application user
- External attacker
- 3rd party (compromise)
- malware
- physical access
- proximity attacks
Instant mitigations:
- server-side APIs TM / PT / review
- OWASP API Top 10
- 3rd party TM / review / risk assessment
- OWASP MASVS
- CI/CD TM
- MiTM protection
Instant Threat Modeling by Jakub Kaluzny (SecuRing).
Threat actors / threats:
- Application user
- External attacker
- 3rd party (compromise)
- malware
- physical access
- proximity attacks
Instant mitigations:
- server-side APIs TM / PT / review
- OWASP API Top 10
- 3rd party TM / review / risk assessment
- OWASP MASVS
- CI/CD TM
- MiTM protection
Instant Threat Modeling by Jakub Kaluzny (SecuRing).
Instant Threat Modeling - #15 Mobile Apps
Instant Threat Modeling - #13 CI/CD Tools
What is Threat Modeling and Why Is It Important?
Instant Threat Modeling - #14 AWS Infrastructure
The B-MAD Approach to Threat Modeling
Use STRIDE To Do A Quick Threat Modeling On A Simple Web Application (Step by Step Guide)
Breaking into Threat Modeling with Adam Shostack
Instant Threat Modeling - #19 API Security
1. Threat Modelling in a Minute: What and Why?
Instant Threat Modeling - #08 Ransomware
Hunting in the Depths - The Need for a Strategic Threat Detection Model
Know Your Enemy – Introduction to Threat Modeling (Part 1: Threat Modeling: What and Why?)
Instant Threat Modeling - #22 Google Cloud Platform
Q&A: Understanding Threat Modeling
Shifting Threat Modeling to Left: Automated Threat Modeling Using Terraform
Instant Threat Modeling - #23 NPM Security
Threat Modelling Kubernetes: A Lightspeed Introduction - Lewis Denham-Parry, Control Plane
How I Would Run a Threat Modelling Session For an Azure Architecture
Beginners Threat Modeling
securiCAD®: Cyber Threat Modeling and Risk Mgmt Introduction
ASC2018 - Threat Modeling web applications - Eng. Nadia Benchikha
Threat Modeling: Applying a Threat Informed Defense | Overview
I Received 8 Hours of 10x Cashback.For the Next 8 Hours,Any Spending Will Earn Me 10X the Cashback!
Madrid Devops July 2022; Practical Threat Modeling
Комментарии