-
Haven't seen updates since 2021. I've been looking for uses of ontology to derive threats from descriptions of infrastructure. This one at least derives them from DFDs, but in Threat Dragon format.
-
Backup of Media files
Media files for uploaded files, including threat models and risk acceptance, are stored in a docker volume. This volume needs to be backed up regularly.
How can I do this ? T…
-
### Describe the bug
In the SDK documentation for creating managed devices there is an example which does not work, I am not sure if this is a user error or a bug, maybe someone can help me here?
…
-
**Is your feature request related to a problem? Please describe.**
The Coronavirus Disease 2019 (COVID-19) has brought a worldwide threat to the living society. The whole world is putting incredible …
-
Right now, when I flash a device with GrapheneOS or do a factory reset, airplane mode gets disabled.
I think it would be a great privacy & security improvement to have a toggle or something that e…
-
- Documentation topics (some coming from the conversations at the NSF Cybersecurity Summit's Jupyter presentation):
- Security structure
- a project-wide view of vulnerabilities in dependencies
…
-
# How to configure a production-grade CI/CD workflow for infrastructure code
Learn about CI/CD workflows for Terraform and Terragrunt, including the differences between application code, different CI…
-
We should develop a security model and some level of formal review.
1. What are our Threat Models?
2. What are our biggest risks?
3. What is our security framework? Both things like authenticati…
-
Is it working right now in any way?
-
Right now if a user types a message and then closes the seamless posting background before submitting the content, the content is dropped directly into the host page.
Obviously this is nice because…
irdan updated
9 years ago