all InfoSec news
A replication of a controlled experiment with two STRIDE variants. (arXiv:2208.01524v1 [cs.CR])
Aug. 3, 2022, 1:20 a.m. | Winnie Mbaka, Katja Tuma
cs.CR updates on arXiv.org arxiv.org
To avoid costly security patching after software deployment,
security-by-design techniques (e.g., STRIDE threat analysis) are adopted in
organizations to root out security issues before the system is ever
implemented. Despite the global gap in cybersecurity workforce and the high
manual effort required for performing threat analysis, organizations are
ramping up threat analysis activities. However, past experimental results were
inconclusive regarding some performance indicators of threat analysis
techniques thus practitioners have little evidence for choosing the technique
to adopt. To address …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Sr. Product Manager
@ MixMode | Remote, US
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Vulnerability Research and Reverse Engineer (Onsite)
@ SNC-Lavalin | FL711: Raytheon SI Gov Dixie Hwy 3520 Dixie Highway NE , Palm Bay, FL, 32905 USA
Principal Consultant, Offensive Security
@ Kroll | CDMX, Mexico