Threat Modeling
Blog Posts
Evaluating Threat-Modeling Methods for Cyber-Physical Systems
Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management

Threat Modeling: 12 Available Methods
Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management

The Hybrid Threat Modeling Method
Modern software systems are constantly exposed to attacks from adversaries that, if successful, could prevent a system from functioning as intended or could result in exposure of confidential information....
• By Nancy R. Mead, Forrest Shull


Cyber Threat Modeling: An Evaluation of Three Methods
This SEI Blog post emphasizes rigorous, automated cyber threat modeling for DoD acquisition.
• By Forrest Shull, Nancy R. Mead

