article thumbnail

Appsec Roundup - Nov 2024

Adam Shostack

The PDF version of Ross Andersons Security Engineering is now freely available. Shostack + Associates updates We released Understanding The Four-Question Framework for Threat Modeling , a whitepaper on the Four-Question Framework. Adam spoke at JPL on Threat Modeling: Engineering and Science. A virtual feast of appsec!

article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

That visceral image of looking at mountains of accumulated issues, feeling overwhelmed by where to begin, captures a challenge many engineering leaders face when they first attempt to systematically assess their systems security. This is why I included interpersonal factors in the Jenga whitepaper.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Anton on Security

Random fun new posts: “SOC Technology Failures?—?Do Do They Matter?” Kill SOC Toil, Do SOC Eng” “Anton and The Great XDR Debate, Part 1” Fun posts by topic. A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” “Today, You Really Want a SaaS SIEM!”

article thumbnail

Anton’s Security Blog Quarterly Q3 2021

Anton on Security

Now, posts by topic. Security operations / detection & response: “Security Correlation Then and Now: A Sad Truth About SIEM” “Can We Have “Detection as Code”?” “Top 10 SIEM Log Sources in Real Life?” “A A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” “Today, You Really Want a SaaS SIEM!”

article thumbnail

Chuck, Acme, and Remediation Avoidance

Adam Shostack

Lets look at what happens if Acme gives Chuck some free resources, like our Fast, Cheap and Good: An Unusual Tradeoff Available in Threat Modeling whitepaper. This means that you want to look for courses focused on: Engineers who arent security specialists. Gravity is a coyotes natural enemy.

article thumbnail

Sonos smart speakers flaw allowed to eavesdrop on users

Security Affairs

NCC Group also published a whitepaper that provides details about the reverse engineering process and exploitation techniques that its experts used to achieve arbitrary code execution on both the Sonos Era-100 and the Sonos One devices. The other major section of the whitepaper is dedicated towards the Sonos Era-100 device.

Wireless 126
article thumbnail

Anton’s Security Blog Quarterly Q1 2022

Anton on Security

“A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” Top 5 Cloud Security Podcast by Google episodes: Episode 1“Confidentially Speaking” Episode 2 “Data Security in the Cloud” Episode 8 “Zero Trust: Fast Forward from 2010 to 2021” Episode 27 “The Mysteries of Detection Engineering: Revealed!” Right of SIEM?