Understanding Threat Modeling and Secure by Design Concept with Adam Shostack

Episode No: 63

Get ready for a paradigm shift in how you build software.

In this episode of the Scale to Zero podcast with Adam Shostack, we crash-landed with a powerful concept called Secure by Design! It's not just a mantra for the Rebel Alliance, it's the key to building unbreachable software from the very first line of code.

Learnings from the podcast

  1. Secure by Design is a key step in building a Healthy Security Programs. It should be done while designing and building applications and not as an afterthought.
  2. When it comes to Threat Modeling, taking a pause and asking questions about possible Threats is equally important as Finding a solution to the Threats.
  3. Communication is key to evangelize and champion security programs in organizations. And it goes both ways. Security to non-security teams and vice versa.

Learning resources recommended by Adam Shostack

  1. Threat Modeling: Designing for Security

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world.

    Get your copy from Amazon now >



  2. CyberGreen

    CyberGreen conducts and supports research that advances the science of Cyber Public Health. They currently support interdisciplinary research of the public health model and how it can most effectively be applied to the challenges of cybersecurity.

    Visit and know more about CyberGreen research >

Insights from Cloudanix

threat modeling

Threat Modeling

Understand the importance of Threat Modeling for your organization. Identify and mitigate potential threats to your systems and data. Protect your assets today!

Cloud compliance checklist - Cloudanix

Checklist for you

A collection of several free checklists for you to use. You can customize, stack rank, backlog these items and share with your other team members.

Go to checklists
Cloudanix Documentation

Cloudanix docs

Cloudanix offers you a single dashboard to secure your workloads. Learn how to setup Cloudanix for your cloud platform from our documents.

Take a look
Monthly changelog

Monthly Changelog

Level up your experience! Dive into our latest features and fixes. Check monthly updates that keep you ahead of the curve.

Take a look
blog repository

Comprehensive Guide to Threat Modeling

In this comprehensive guide, we will explore the concept of threat modeling, its benefits, and how it can be implemented to strengthen your security posture.

Read more