-
### Proposal
Introduce support for creating threat modeling diagrams using Mermaid.js. Threat modeling is a critical process in cybersecurity, enabling architects, developers, and security profession…
-
## Date
Thursday 10 Oct 2024 - 11am (US eastern timezone EDT/EST) / 4pm (London, GMT/BST)
### Zoom info
- **[Join Zoom Meeting](https://zoom.us/j/96940294948?pwd=SjFibVdiN25QSWxva3FqRHY2RUFCdz09)…
-
## Date
Thursday 12 Sept 2024 - 11am (US eastern timezone EDT/EST) / 4pm (London, GMT/BST)
### Zoom info
- **[Join Zoom Meeting](https://zoom.us/j/96940294948?pwd=SjFibVdiN25QSWxva3FqRHY2RUFCdz09…
-
**Who do you want to protect?**
- Yourself and personal identity
- Your family
- Your team
- Clients if self employed
- Online personas
**What do you want to protect?**
- Reputation ( self …
-
We need a threat modelling document that outlines Meson's threat model and what kind of adversary it can handle and what kind of adversary it doesn't take into account. This should give users of Meson…
-
**Description**
As result of the Threat Modelling workshop from Aug 2024, we identified that a reliably applied retry- and also alerting mechanism as crucial to prevent KIM from inconsistent states…
-
-
According to @panositi, the EU project TELEMETRY has a use case that requires some elaboration in the models of software processes and control of router functions. The requirements are:
1. A mechanis…
-
We need to define a solid Threat Model. Initial comment by [Wess](https://github.com/expressjs/discussions/issues/165#issuecomment-1974869493)
**Resources**
- https://github.com/nodejs/node/pull…
-
**Description**
To follow the least privilege approach for the Compass Manager, restrictive RBAC rules have to be established.
The Kubernetes service account which is used to run the Compass Ma…