Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 58 — Threat Modeling for Apps: Microservices and APIs

23:52
 
Share
 

Manage episode 505187664 series 3688683
Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Applications today are increasingly built on microservices and APIs, and each component introduces potential vulnerabilities. This episode focuses on threat modeling at the application level, showing how to identify and address risks across distributed architectures. Techniques like STRIDE and data flow diagrams can be adapted to cloud environments to uncover trust boundary violations and insecure dependencies.

The exam may test your ability to apply threat modeling in practical scenarios, such as identifying where an API call could be intercepted or manipulated. By mastering these approaches, you’ll not only gain exam points but also develop the skills to proactively strengthen the security posture of cloud-native applications. Produced by BareMetalCyber.com.

  continue reading

99 episodes

Artwork
iconShare
 
Manage episode 505187664 series 3688683
Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Applications today are increasingly built on microservices and APIs, and each component introduces potential vulnerabilities. This episode focuses on threat modeling at the application level, showing how to identify and address risks across distributed architectures. Techniques like STRIDE and data flow diagrams can be adapted to cloud environments to uncover trust boundary violations and insecure dependencies.

The exam may test your ability to apply threat modeling in practical scenarios, such as identifying where an API call could be intercepted or manipulated. By mastering these approaches, you’ll not only gain exam points but also develop the skills to proactively strengthen the security posture of cloud-native applications. Produced by BareMetalCyber.com.

  continue reading

99 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play