continuous-threat-modeling
A Continuous Threat Modeling methodology (by Autodesk)
Threat_Model_Examples
Collection of Threat Models (by TalEliyahu)
continuous-threat-modeling | Threat_Model_Examples | |
---|---|---|
1 | 1 | |
288 | 335 | |
0.0% | - | |
0.0 | 10.0 | |
almost 2 years ago | almost 2 years ago | |
GNU General Public License v3.0 or later | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
continuous-threat-modeling
Posts with mentions or reviews of continuous-threat-modeling.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Building security in to Agile Srpints
Also checkout the DevSLOp YouTube channel, autodesks continuous threat modeling at https://github.com/Autodesk/continuous-threat-modeling and OWASPs ASVS. That should set you up quite nicely.
Threat_Model_Examples
Posts with mentions or reviews of Threat_Model_Examples.
We have used some of these posts to build our list of alternatives
and similar projects.
What are some alternatives?
When comparing continuous-threat-modeling and Threat_Model_Examples you can also consider the following projects:
SIEM - SIEM Tactics, Techiques, and Procedures
Quick-Analysis - Quick analysis focusing on most important of a Malware or a Threat