Robuta

https://github.blog/security/supply-chain-security/3-strategies-to-expand-your-threat-model-and-secure-your-supply-chain/ 3 strategies to expand your threat model and secure your supply chain - The GitHub Blog How to get the security basics right at your organization. secure supply chainthreat modelgithub blogstrategiesexpand https://owasp.org/www-project-lets-threat-model/ OWASP Lets Threat Model | OWASP Foundation A very brief, one-line description of your project threat modelowaspletsfoundation https://www.linuxfoundation.org/press/threat-model-and-independent-verifier-audit-examine-the-security-of-ebpf Threat Model and Independent Verifier Audit Examine the Security of eBPF Nov 12, 2024 - Two research reports sponsored by the eBPF Foundation audit security of eBPF and provide deployment guidance, plus inherent controls and recommendations threat modelindependentverifierauditexamine https://safeboot.dev/threats/ safeboot threat model - safeboot Debian package to enable UEFI SecureBoot, enroll your own hardware backed platform key, sign the kernel and initrd, decrypt the disk with the TPM, and enable... threat model https://owasp.org/www-project-threat-model-library/ OWASP Threat Model Library | OWASP Foundation Welcome to the first, open-sourced, structured, peer-reviewed threat modeling dataset threat modellibrary foundationowasp https://www.mitre.org/news-insights/news-release/mitre-unveils-full-release-emb3d-threat-model-introduces-mitigations MITRE Unveils Full Release of EMB3D Threat Model that Introduces Mitigations | MITRE Expanded model helps identify threats and implement tailored security for embedded devices full releasethreat modelmitreintroducesmitigations https://nextcloud.com/security/threat-model/ Threat model - Nextcloud threat modelnextcloud https://www.ssllabs.com/projects/ssl-threat-model/index.html Qualys SSL Labs - Projects / SSL Threat Model ssl labsthreat modelqualysprojects https://protonvpn.com/blog/threat-model Understanding the VPN Threat Model | Proton VPN Feb 13, 2026 - In this article, we analyze the VPN threat model. This covers the threats a VPN is designed to guard against, and also the threats a VPN cannot counter. threat modelunderstandingvpnproton https://link.springer.com/chapter/10.1007/978-3-031-68024-3_1?error=cookies_not_supported&code=e89e6e09-8f3d-480a-a2b5-5b51ea4fdd83 Implications of Age Assurance on Privacy and Data Protection: A Systematic Threat Model | Springer... In today’s digital world, children are encouraged to develop a significant part of their daily lives by online means. Age assurance solutions have become... privacy and dataage assurancethreat modelimplicationsprotection https://7asecurity.com/blog/tag/threat-model/ Threat Model Archives - 7ASecurity Blog Articles tagged with "Threat Model" threat modelarchives7asecurityblog https://developers.openai.com/codex/security/threat-model Improving the threat model – Codex Security | OpenAI Developers Refine the Codex Security context that ranks findings and helps you review faster threat modelimprovingcodexsecurityopenai