Threat Modeling resources curated just for you.

A bi-weekly newsletter with more than 505 subscribers. Join us!


What to expect?

I browse for threat modelling content on a daily basis. I use the knowledge to feed my research for creating new security concepts and to keep my awareness up-to-date. 

Now, I decided to share them with you in the form of a newsletter. 


Trusted Sources

I use trusted sources for news, job offers, newly discovered threats, company updates and interesting articles.

I try to stay vendor independent. 

Privacy first

Your privacy is my focus. I will not sell nor give your data to any 3rd party. 

I don't sent spam messages and try to use as less as tracking as possible.

it's for you

If you are touching the Software Development process - this newsletter is for you.

There is something for Developers, DevOps, UX, Security champions, Architects, CEO, CTO, ... and for you. 

What is Threat Modeling?

Per Wikipedia, the core definition of threat modeling is “Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.”

If we want to get practical and decode this into something that everyone could understand, it's answering four simple questions:

I bet you can’t guess what % of your security peers are reading my newsletter.

Citrix | sugarCRM | IriusRisk | Wells Fargo | Dynatrace | IBM | Broadcom | DXC | Oracle | University of Oxford | Accolade | Portworx | Pure Storage | Visa Europe | Microsoft | and many more…

Your curator

.