-
Scan with Avira antivirus, 5 files with threats.
-
## Current Behavior
Example, if set is assigned via dictonary key&value
Service sentienlone_threats is in two service sets.
Set _windows-agent-managed_sentinelone_:
has the following as…
-
In the attached screen shot I created a simple diagram and added to threats "My Threat 1" and "My Threat 2" but can't seem to figure out how to add them onto the diagram so does that functionality not…
-
## Issue
This site has been reported as unsafe
Hosted by zeljkoobrenovic.github.io
Microsoft recommends you don't continue to this site. It has been reported to Microsoft for containing phishing …
-
--Discuss more threats: integrity-protection of advertized information, origin authentication, prevent ddos, ...
-
Some threats, usually representing normal operations or the side effects of controls, have no causes that could depend on other threats. For example:
- the 'threat' representing switching on a Phys…
-
**Describe what problem your feature request solves**:
Once a threat is created, it is not possible to duplicate it or move it to other components. You need to manually repeat the whole process or …
-
### Brief Description 🤓
AI-powered APIs designed to protect against cyber threats that you can integrate into your project. It use machine learning algorithms to detect and respond to cyber threats i…
-
Hi, I am trying IriusRisk for threat modeling, and I think it is a great app in both quality and UX.
But one part that concerns me is that when I draw a dataflow diagram, only the threat and counterm…
-
### Contact Details
vicente.herrera@control-plane.io
### What is the idea
This is a request for direct feedback and answers to the following question regarding a threat described in the gover…