https://github.blog/security/supply-chain-security/3-strategies-to-expand-your-threat-model-and-secure-your-supply-chain/
3 strategies to expand your threat model and secure your supply chain - The GitHub Blog
How to get the security basics right at your organization.
secure supply chainthreat modelgithub blogstrategiesexpand
https://owasp.org/www-project-lets-threat-model/
OWASP Lets Threat Model | OWASP Foundation
A very brief, one-line description of your project
threat modelowaspletsfoundation
https://www.linuxfoundation.org/press/threat-model-and-independent-verifier-audit-examine-the-security-of-ebpf
Threat Model and Independent Verifier Audit Examine the Security of eBPF
Nov 12, 2024 - Two research reports sponsored by the eBPF Foundation audit security of eBPF and provide deployment guidance, plus inherent controls and recommendations
threat modelindependentverifierauditexamine
https://safeboot.dev/threats/
safeboot threat model - safeboot
Debian package to enable UEFI SecureBoot, enroll your own hardware backed platform key, sign the kernel and initrd, decrypt the disk with the TPM, and enable...
threat model
https://owasp.org/www-project-threat-model-library/
OWASP Threat Model Library | OWASP Foundation
Welcome to the first, open-sourced, structured, peer-reviewed threat modeling dataset
threat modellibrary foundationowasp
https://www.mitre.org/news-insights/news-release/mitre-unveils-full-release-emb3d-threat-model-introduces-mitigations
MITRE Unveils Full Release of EMB3D Threat Model that Introduces Mitigations | MITRE
Expanded model helps identify threats and implement tailored security for embedded devices
full releasethreat modelmitreintroducesmitigations
https://nextcloud.com/security/threat-model/
Threat model - Nextcloud
threat modelnextcloud
https://www.ssllabs.com/projects/ssl-threat-model/index.html
Qualys SSL Labs - Projects / SSL Threat Model
ssl labsthreat modelqualysprojects
https://protonvpn.com/blog/threat-model
Understanding the VPN Threat Model | Proton VPN
Feb 13, 2026 - In this article, we analyze the VPN threat model. This covers the threats a VPN is designed to guard against, and also the threats a VPN cannot counter.
threat modelunderstandingvpnproton
https://link.springer.com/chapter/10.1007/978-3-031-68024-3_1?error=cookies_not_supported&code=e89e6e09-8f3d-480a-a2b5-5b51ea4fdd83
Implications of Age Assurance on Privacy and Data Protection: A Systematic Threat Model | Springer...
In today’s digital world, children are encouraged to develop a significant part of their daily lives by online means. Age assurance solutions have become...
privacy and dataage assurancethreat modelimplicationsprotection
https://7asecurity.com/blog/tag/threat-model/
Threat Model Archives - 7ASecurity Blog
Articles tagged with "Threat Model"
threat modelarchives7asecurityblog
https://developers.openai.com/codex/security/threat-model
Improving the threat model – Codex Security | OpenAI Developers
Refine the Codex Security context that ranks findings and helps you review faster
threat modelimprovingcodexsecurityopenai