.png)
Machine Learning and Threat Modeling
The CISO's Guide to AI Terms: Speaking the Language of Machine Learning
February 4, 2025


Methodologies & Frameworks
Applying STRIDE Methodology to Threat Model a New Component
April 25, 2023




Threat Modeling
Security Champions & Threat Modeling at a time of increased cybercrime
August 17, 2023

Threat Modeling
Threat modeling workflow for Microsoft Threat Modeling Tool
November 11, 2022

Compliance & Regulation
Software security
EU Cyber Resilience Act & Threat Modeling
November 1, 2022


Infrastructure as Code
IriusRisk Threat Modeling Club Live! What is the Open Threat Model?
May 6, 2022

Methodologies & Frameworks
Cloud Security
Threat Modeling Software Features vs Architecture
February 22, 2022


Risk Management
Software security
Threat Modeling
Evolving Threat Modeling - Taking Longer Strides
August 16, 2022

Compliance & Regulation
Threat Modeling
Use Case - Threat Modeling Smart Buildings with IEC/ANSI 62443
September 22, 2022


Methodologies & Frameworks
Infrastructure as Code
Cloud Security
Threat modeling workflow for Terraform defined architectures using IriusRisk
June 16, 2022

Infrastructure as Code
Open Threat Model Standard under a Creative Commons License
March 23, 2022


Infrastructure as Code
Software security
Threat Modeling
Microsoft Visio threat modeling workflow
November 11, 2022


Software security
Threat Modeling
Supply Chain Security
SBOM: Where’s My Threat Model?
January 20, 2023


Software security
Threat Modeling
Security Champions: The Importance of Threat Modeling
May 12, 2023

Risk Management
Software Security
Threat Modeling
Threat Modeling: Finding Flaws Before Software Goes Live.
November 3, 2021