adam shostack (@adamshostack) 's Twitter Profile
adam shostack

@adamshostack

Done with Twitter. Don't expect responses.
Threat Modeling: Designing for Security. Working to reduce bad security outcomes.

ID: 18783289

linkhttps://shostack.org calendar_today08-01-2009 22:56:09

19,19K Tweet

10,10K Takipรงi

525 Takip Edilen

Katie๐ŸŒปMoussouris (she/her/she-ra/she-hulk) ๐Ÿชท (@k8em0) 's Twitter Profile Photo

I remember Russian spies getting full time in-person jobs at Microsoft so my threat model has always been attuned to some form of this issue of spies infiltrating the software supply chain. theatlantic.com/international/โ€ฆ

adam shostack (@adamshostack) 's Twitter Profile Photo

Shostack + Associates is launching a new course, Scaling Threat Modeling, and we'd like your input shostack.org/blog/scaling-tโ€ฆ

Shostack + Associates is launching a new course, Scaling Threat Modeling, and we'd like your input shostack.org/blog/scaling-tโ€ฆ
Crispin Cowan ๐Ÿ‡บ๐Ÿ‡ฆ (@crispincowan0) 's Twitter Profile Photo

Back in the day, I did some cool #security #UX work with adam shostack and Rob Reeder at Microsoft. Now Beyond Identity is recruiting for a security-savvy UX designer. Any of my #infosec peeps interested? linkedin.com/posts/allan-ziโ€ฆ

Kim Zetter (@kimzetter) 's Twitter Profile Photo

Synology created a patch to address the zero-click vulnerability that researchers at Midnight Blue found, but adam shostack spotted this explanation about the patch:

Synology created a patch to address the zero-click vulnerability that researchers at <a href="/midnightbluelab/">Midnight Blue</a> found, but <a href="/adamshostack/">adam shostack</a> spotted this explanation about the patch:
Steven Murdoch (@sjmurdoch) 's Twitter Profile Photo

adam shostack Kim Zetter Midnight Blue When I saw those release notes I assumed Synology were trying to reduce codec license fees. Whatever the reason, as you say, security patches should not come at the cost of features.

adam shostack (@adamshostack) 's Twitter Profile Photo

New bloggage, shostack.org/blog/who-are-wโ€ฆ The paper is Who Are โ€œWeโ€? Power Centers in Threat Modeling, and the abstract reads: โ€œI examine threat modeling techniques and questions of power dynamics...

New bloggage, shostack.org/blog/who-are-wโ€ฆ The paper is Who Are โ€œWeโ€? Power Centers in     Threat Modeling, and the abstract reads: โ€œI examine     threat modeling techniques and questions of power dynamics...