-
## Goal state
Provide an opinionated view and implementation of the e2e observability pattern that would help organisations to truly 'turn on the light' for their AI usage in Azure.
All services…
-
- [ ] Is the [inherent Rogue threat modifier](https://www.wowhead.com/wotlk/spell=21184/rogue-passive-dnd) still -29%?
- [ ] Do any abilities generate particular amounts of extra threat?
- [ ] Does …
-
As we are going to have ESS and serverless docs separately.
It would be great for us to review all the doc links we have in security solution, and retrieve them with `getDocLinks` e.g…
-
Hello,
We would like to propose a new SRO (STIX Relationship Object) between two Threat-Actors or between two Malwares. Indeed, we see in the past that some groups shut down its activities, and join…
-
Hey.
I just tested this bot but it doesn't seem to recognize any threats.
I posted a few links directly from Phishing.Database's lists (old ones, new ones, doesn't matter), the bot marked all of t…
-
### Have you contacted the Support Team already?
- [X] I have attempted already, but to no avail, or they pointed me here.
### What are the issues you need support with?
"A blocklist for blocking m…
-
Figure out threat coefficients for the different spells and add a threat output to the GUI
-
We need a threat modelling document that outlines Meson's threat model and what kind of adversary it can handle and what kind of adversary it doesn't take into account. This should give users of Meson…
-
Hi Brock,
in our environment all incoming external requests are handled by Microsoft TMG, which makes SSL Offload and then internally it goes from TMG to Application Server via HTTP. With such a conf…
-
So, the threats on layer 8 are less mechanically driven than the threats on previous layers, so I'm not sure the best way to implement them.
For the inanis ego, I was thinking a series of events w…