Discussion about this post

User's avatar
K.S.'s avatar

Could we use realtime threat modeling to monitor for new and evolving threats?

Wouldn't this just blur the line between threat modeling and attack/abuse/system modeling?

Expand full comment
1 more comment...

No posts