Tagged: security-guidelines

Rapid Threat Model Prototyping

Last year I had the opportunity to take part to one of Geoffrey Hill’s presentation about the Rapid Threat Model Prototyping (RTMP) methodology he designed. I find it incredibly useful, so I decided to share with you the core principles and steps. This document is based on the Rapid Threat Model Prototyping official document.The RTMP is quite simply to apply: define the system design and the zones of trust, then...

Best Email Signing and Encryption Solutions

Hi and welcome! I was honored to present this topic at #dc4420. You can read here everything I presented if you’d like to run through some things one more time. I addressed yesterday’s questions at the end of the article. You can always drop me an email if you have questions and if I can help, I will. I would like to introduce you the most known standards and the...