STRIDE Threat Modelling: Six Steps to a Secure Application
Today’s cyber attackers are becoming ever more inventive in the way they achieve big bang cyber attacks, using tactics such as hacking suppliers in order to gain access to their customers, or compromising vulnerabilities inside an application’s code in order to attack an organisation. As a result, developers need to be more threat conscious than…