No video

Automated Threat Modeling using IRIUSRISK

  Рет қаралды 2,302

DevSec Hacker

DevSec Hacker

Күн бұрын

1. Decompose the application
2. Determine and Rank Threats
3. Determine countermeasures and mitigation
Support my work:
www.buymeacoff...

Пікірлер: 7
@DevSecHacker
@DevSecHacker 4 ай бұрын
if you want to support my work: www.buymeacoffee.com/devsechacker
@basedviking8183
@basedviking8183 8 ай бұрын
great tule!
@DevSecHacker
@DevSecHacker 8 ай бұрын
Thank you!
@flowersareyellow
@flowersareyellow 18 күн бұрын
Do you think this tool is good for future career?
@DevSecHacker
@DevSecHacker 18 күн бұрын
It is good for a career only. Because whatever the tools come into the picture finally a human intelligence should validate the accuracy of threats or findings. The advantage of it is we can make the threat modeling process faster and efficient.
@binaynayak1720
@binaynayak1720 Ай бұрын
How to edit the Trust zone?
@DevSecHacker
@DevSecHacker 25 күн бұрын
Right click on trust zone and edit
STRIDE Threat Modeling for Beginners - In 20 Minutes
21:49
Netsec Explained
Рет қаралды 29 М.
IriusRisk Community Edition Ask Me Anything | June 2023
53:00
ROLLING DOWN
00:20
Natan por Aí
Рет қаралды 11 МЛН
Running With Bigger And Bigger Feastables
00:17
MrBeast
Рет қаралды 157 МЛН
wow so cute 🥰
00:20
dednahype
Рет қаралды 29 МЛН
Threat modelling with OWASP Threat Dragon
11:54
Manning Publications
Рет қаралды 9 М.
SSRF bypass using DNS rebinding
8:31
DevSec Hacker
Рет қаралды 2,5 М.
How to Build a Threat Model for Kubernetes Systems
41:28
Techstrong TV
Рет қаралды 921
The Start Left Diaries  Automating Threat Modeling
13:23
IriusRisk
Рет қаралды 84
From Zero To Hero: Threat Modeling In 90 Minutes by Steven Wierckx
1:10:29
44CON Information Security Conference
Рет қаралды 7 М.
Training6-OWASP Threat Dragon (Threat Model) Demo
35:00
KGopi TechSolutions
Рет қаралды 6 М.
Security Review made easy with Iriusrisk + Chatgpt
12:20
DevSec Hacker
Рет қаралды 302
ROLLING DOWN
00:20
Natan por Aí
Рет қаралды 11 МЛН