Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

DREAD, The Pirate Approach →

June 05, 2018 by Marc Handelman in Code, Bugs, Bug Bounty

via the inimitable Adam Shostack (author of The New School of Information Security) and Threat Modeling; a leader in the Threat Modeling arena), whilst writing at his fascinating blog, comes a sterling discussion of the DREAD method; or How To Name A Bug Bounty Program. Certainly, today's MustRead, enjoy!

June 05, 2018 /Marc Handelman
Code, Bugs, Bug Bounty
  • Newer
  • Older