
Lessons in threat modeling: How attack trees can deliver AppSec by design
Here's what development and application security teams need to know about using attack trees in combination with threat modeling to lock down their software.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

Here's what development and application security teams need to know about using attack trees in combination with threat modeling to lock down their software.

"The Growing Complexity of Securing the Software Supply Chain" report highlights key challenges for application security teams. Here's what you need to know.

2023 was a big year for software security. Here are the key lessons from last year's major attacks to learn from.

Let’s band together for the love of security

Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

Here's why organizations are struggling with TPCRM — and how to develop an effective program.

The TeamCity incident is similar to SunBurst, which was behind the attack on SolarWinds. But there are differences. Here are tips to help secure your software pipeline.

More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

U.K. and U.S. cyber-watchdogs say to start with Secure by Design — but don't stop there. Here are key takeaways from their new guidelines.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial