omerlh.info
Threat Modeling as Code - Omer Levi Hevroni
Can we conduct threat modeling using code and git? Why should we do that? And how can the move to threat-modeling-as-code improve the process?