Dec 26, 2017 (MODIFIED: Jan 24, 2018)
In Part 5 of this blog series, we use inversion modeling techniques to develop a high-level protection strategy.
Nov 28, 2017 (MODIFIED: Jan 02, 2018)
In Part 3 of this blog series, we demonstrated modeling the threat landscape along with executive threat-modeling. In this blog, we discuss the importance of defining controls.
Aug 23, 2017 (MODIFIED: Oct 10, 2017)
How InfoSec leaders can build successful threat models by defining the threat landscape and its component resources, then asking simple, situational questions.
May 04, 2017 (MODIFIED: Jul 18, 2017)
Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls that minimizes risk and achieves continuous compliance.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.