THREAT MODELING

The walls have ears

Modern business often relies heavily on the Internet and software resources such as Zoom or Skype to support daily operations. Use of such systems often requires additional hardware resources like microphones and cameras. Advances in computing has provided a pathway for these very ordinary hardware commodities to develop into resources that enrich user experience through […]

The walls have ears Read More »

Trike

Sparked from a question on our public discord channel https://discord.gg/HeHuehh   What does GRIMM’s threat modeling process look like?  Is it only used in the design phase of the Software/System Development Life Cycle (SDLC), or can it be applied to systems already in production?   We use the Trike methodology on account of it’s friendliness

Trike Read More »