Modus Security: What’s Your Threat Surface?
Modus Create
JUNE 1, 2020
The news is filled with tales of hackers breaking into financial institutions, DDoS attacks on credit card companies, and data breaches due to poor software configuration. The Modus threat modeling process uses several iterative steps that start with a discovery stage and ends with a final presentation. Who are the actors?
Let's personalize your content