Microsoft Application Threat Modeling Blog

Threat Uploader for Team Foundation Server

Rocky brought my attention to a blog entry by Mitch Denny in which he talks about a tool he created...

Author: talhahm Date: 04/11/2006

What's happening around Threat Modeling

There’s a lot happening around threat modeling which is why it’s been a while since I posted my last...

Author: talhahm Date: 04/05/2006

Threat Modeling without Security Subject-Matter Expertise

With this release of the process and the accompanying tool, there were 4 high-level objectives we...

Author: talhahm Date: 03/16/2006

BETA2 NOW AVAILABLE!

BETA2 of Microsoft Threat Analysis & Modeling v2.0 (formerly codenamed “ACE Torpedo”) is now...

Author: talhahm Date: 03/13/2006

[VIDEO] What is Microsoft Application Threat Modeling?

[UPDATE] The video has been updated slightly and the video link below has changed (old link won't...

Author: talhahm Date: 03/09/2006

Webcast

Recently I did a webcast on our methodology at the end of which I gave a sneak peak of the tool (one...

Author: talhahm Date: 03/03/2006

Intro to our methodology

I should have posted this earlier but Rocky has a great intro to our threat modeling methodology...

Author: talhahm Date: 03/01/2006

Attack Library & Training Modules

One of the key components of our threat modeling methodology is the Attack Library with which what...

Author: talhahm Date: 02/23/2006

What is a “threat?”

Over the past years that I’ve been involved with threat modeling in the ACE Team, one of things I...

Author: talhahm Date: 02/21/2006

What is Microsoft Threat Analysis & Modeling?

So far we’ve written generally about what Microsoft Threat Analysis & Modeling is, but lets get...

Author: ACE Team Date: 02/15/2006

Understanding the risk: Threat Modeling for the Enterprise at RSA '06

If you will be attending RSA 2006, we invite you to attend the session: Understanding the Risk:...

Author: ACE Team Date: 02/14/2006

An Introduction to Microsoft Application Threat Modeling

Welcome to the Microsoft Application Threat Modeling blog! Here you will be able to learn about the...

Author: ACE Team Date: 02/13/2006

<Previous