Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335 - podcast episode cover

Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335

Jun 17, 20251 hr 8 min
--:--
--:--
Download Metacast podcast app
Listen to this episode in Metacast mobile app
Don't just listen to podcasts. Learn from them with transcripts, summaries, and chapters for every episode. Skim, search, and bookmark insights. Learn more

Episode description

What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that are more conducive to useful threat models.

Resources:

In the news, learning from outage postmortems, an EchoLeak image speaks a 1,000 words from Microsoft 365 Copilot, TokenBreak attack targets tokenizing techniques, Google's layered strategy against prompt injection looks like a lot like defending against XSS, learning about code security from CodeAuditor CTF, and more!

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw-335

For the best experience, listen in Metacast app for iOS or Android
Open in Metacast
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335 | Application Security Weekly (Audio) podcast - Listen or read transcript on Metacast