
Threat modeling: our approach to identify digital vulnerabilities software solution
How do you know if a software solution is sufficiently secure? We use the method Treat Modeling, learn more about our approach.
- Title
- Threat modeling: our approach to identify digital vulnerabilities software solution
- Author
- Robin Hermanussen & Merel IJpelaar
- Publication date
- Alteration date
- Publication
-
Iquality
- URL
- /blog/threat-modeling