Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it.
I have talked previously about the nature of the File Guard project, and what makes it a big task. Today, I’d like to share the new approach we took to create the design for that project.
The purpose of this blog piece is to introduce the concept of threat analysis, what it is and why it’s a good idea, while at the same time present a simple and effective way to try it yourself. It is part of a blog series on the development approach at Nexor.
I recently read the book “Advance Persistent Threat: Understanding the Danger and How to Protect your Organization”. The following paragraph in the introductory Chapter really stood out for me:
Get Safe Online recently reported the following via twitter:
This should not be a surprise.