ianonymous3000, to Cybersecurity
@ianonymous3000@mastodon.social avatar

📚 Just completed the 'Basics of Personal Threat Modeling' course by @privacyguides 🛡️

Threat modeling is crucial because it helps identify and prioritize the most probable security and privacy risks. It enables focused resource allocation, tailored defenses, and heightened awareness.

Check it out: https://learn.privacyguides.org

#Cybersecurity #Privacy #ThreatModeling #cybersecurityawareness #opsec

image/png

angdraug, to TikTok
@angdraug@mastodon.social avatar

I recently saw a conversation between two people I respect that ended poorly. This being a social platform, shortage of mutual understanding is not surprising. Most of the time, I just back away slowly, but this time, the topic is important enough, and I think I can see a framing that can help make conversations about it less antagonistic.

The topic is #ThreatModeling around #TikTok.

If you don't know what threat modeling is, start here: https://circle.lt/post/20190405-social-networks-hygiene/#threat-model 1/

rpetrich, to node

I spelunked into steganography to create a new feature in https://www.deciduous.app/ that lets you reimport PNGs and SVGs of your decision trees to derive the underlying YAML.

It involves some neat tricks inspired by Macromedia Fireworks (RIP), so I wrote a blog post about it: https://rpetrich.com/blog/posts/steganographic-trees-deciduous/

Deciduous now also sports a CLI (so you can #npm install it), and a bunch of lil things @shortridge and I added towards the goal of fast, easy, collaborative #threatmodeling of potential failures.

SheHacksPurple, to random

🎉 Level Up Your Threat Modeling Skills with me and @adamshostack! 🚀

Are you ready to master threat modeling? Join us for the "Maturing Your Threat Modeling Skills" @semgrep Community virtual event Jan 25, 9:00 am PT.

https://semgrep.dev/events/maturing-your-threat-modeling-skills/

cigitalgem, (edited ) to ML
@cigitalgem@sigmoid.social avatar

Today we worked on comments (some were toughies) from 8 readers/reviewers of our LLM architectural risk analysis (ARA) draft. BIML plans to release this work 1.24.24

#MLsec #ML #AI #threatmodeling #ARA

But not #AdversarialAI

cR0w, to random

I can't believe that this is still a thing, but if your risk model is noticeably impacted by the adversarial capability of writing an email in the English language then I'm pretty sure your threat model is already broken.

https://www.nbcnews.com/tech/security/nsa-hacker-ai-bot-chat-chatgpt-bard-english-google-openai-rcna133086

#threatmodeling #phishing

cigitalgem, to ML
@cigitalgem@sigmoid.social avatar

The MATCH webinar was recorded and is now available via video
#swsec #appsec #threatmodeling
#MLsec #ML #AI

Proud to have participated with Irius Risk and Calypso AI

https://youtu.be/RI0pNGH9bgA?feature=shared

cigitalgem, to ML
@cigitalgem@sigmoid.social avatar

The webinar will begin in 5 minutes:
Machine learning
Artificial intelligence
Threat modeling
Compliance
How the heck these link together

noplasticshower, to ML
@noplasticshower@zirk.us avatar

I plan to "live toot" this morning's webinar beginning at 11am NY time (4pm London time) with my @cigitalgem identity. Feel free to follow along using the hashtag .

cigitalgem, (edited ) to ai
@cigitalgem@sigmoid.social avatar

With the rise of AI, ML, and increasing compliance demands, the future holds exciting challenges. While we may not have a crystal ball, we've assembled a panel of experts to share their thoughts including Dr Gary McGraw, Stephen de Vries, Siebe De Roovere & Neil Serebryany
Join our webinar to learn just how the heck all of this fits together! https://lnkd.in/eq23dZ8M

Registration - https://www.iriusrisk.com/iriusrisk-match-webinar-2023

#threatmodeling #compliance #securedesign #ai #machinelearning #LLMs #swsec #MLsec

marcel, to random German
@marcel@waldvogel.family avatar

#Bern begrüsst seine Besucher des #SwissCyberStorm #SCS23 mit einem kleinen #Rainstorm.

marcel,
@marcel@waldvogel.family avatar

Critique about programs:

Q&A:

  • might be helpful to protect against , which targets the user's workflow (last-minute things)
ulf, to random German
@ulf@chaos.social avatar

The #ThreatModeling Card from @adamshostack keeps the Lights on in my Hotel room while I let my Flipper play with the original key card 😈

cR0w, to ai

I just remembered that @thegrugq let me rant into a larger void about poor #AI #threatmodeling a while back and I should just tap the sign now and then instead of wasting cycles on repeating myself.

https://grugq.substack.com/p/i-refuse-to-bow-to-our-ai-overlords

adamshostack, to random

I had a great time with Chris Romeo on his podcast, “The Threat Modeling Podcast.” I’m honored to be featured on one of his first episodes and would highly recommend anyone with an inkling of an interest in threat modeling check out his work.

We dive deep into the Four Questions framework and explore the meaning and purpose, simplifying the threat modeling process.

Lean into these four questions, and you might just become a threat modeling Jedi! ⚔️

https://threatmodel.buzzsprout.com/2152378/12826352-the-four-question-framework-with-adam-shostack?utm_content=buffere71ad&utm_medium=social&utm_source=bufferapp.com&utm_campaign=buffer

#ThreatModeling

raptor, to random
dymaxion, to climate

A few :

I run Systems Structure Ltd., a US consultancy that provides fractional CISO services for pre-A to post-C round , along with training and reviews.

I've been working in since 2003 and did a spell in NGOland from ~2011 to 2016, working with NGOs and news organizations targeted by states and on tools they use, including the messaging app. The field work I did then fundamentally reshaped my approach to security, and I recommend that everyone in the field learn about the reality of being a high-risk user.

I live in the days, although in the before times (and hopefully soon again) I spent a fair bit of time in and . I run a performance space out of my home, along with my partner, called The Attic (@theatticfi on insta), where we make space for , , , and music, along other things. Before I moved here, I spent six or so years traveling full time.

I have written various essays over the years, which you can see on dymaxion.org, and I'm slowly writing a book. While security pays the bills, I spend a lot of my time thinking about , and in particular how the human and technical bits mesh, how they fail, and how to redesign them to fail better. In practice, this has meant everything from consulting on a constitution to thinking about what comes after the apocalypse. The "recruiting barbarians" in my bio refers to being more comfortable outside of institutions, but I'm starting to think more about community and infrastructure building now that I live somewhere.

I'm also an ; I paint and am slowly learning my way around a , and I've been accused of being an . I'm active in the scene, where we take larp serious as a dramatic form and do everything from a reworking of Hamlet played at the actual Elsinore castle to a larp about the early days of the HIV crisis. I'm primarily a theorist and critic there, as well as player, and I've edited two books and written a number of essays. Nordic larp has the best toolkit I've seen anywhere for analyzing the human parts of complex systems and especially for building new systems; it's heavily influenced my security work, along with my thinking.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • cubers
  • thenastyranch
  • InstantRegret
  • Youngstown
  • rosin
  • slotface
  • Durango
  • ngwrru68w68
  • khanakhh
  • kavyap
  • everett
  • DreamBathrooms
  • anitta
  • magazineikmin
  • cisconetworking
  • GTA5RPClips
  • osvaldo12
  • tacticalgear
  • ethstaker
  • modclub
  • tester
  • Leos
  • normalnudes
  • provamag3
  • megavids
  • lostlight
  • All magazines