Sparked from a question on our public discord channel   What does GRIMM’s threat modeling process look like?  Is it only used in the design phase of the Software/System Development Life Cycle (SDLC), or can it be applied to systems already in production?   We use the Trike methodology on account of it’s friendliness […]

Trike Read More »