PinnedAshish ShrivastavaThreat modeling for OAuth 2.0In this post I am trying to explain OpenID Connect and OAuth 2.0 Threat Model and Security Considerations and Best Practices check list.Jun 27, 2021Jun 27, 2021
Ashish ShrivastavaMedical Device Cybersecurity: Cybersecurity to the Next Level from the FDA’s viewWhat You Need to Know, Safeguards and ChallengesDec 5, 2021Dec 5, 2021
Ashish ShrivastavaRansomware on the Rise : How threat Intelligence help to Identify.Ransomware is a growing large problem around the world. It’s one of problem that require preparation. Ransomware has become one of the…Sep 3, 2021Sep 3, 2021
Ashish ShrivastavaPrepare for Zero Trust, Security Model at the organizational level: Foundations and ImplementationThe increasing usage of cloud-based services, mobile computing, internet of things (IoT), and bring your own device (BYOD) in the industry…Aug 3, 2021Aug 3, 2021
Ashish ShrivastavaThreat modeling for OpenID Connect and OAuth 2.0Threat Patterns and Attack find in OAuth2.0 & OpenID Connect along with countermeasures and security best practices.Jun 27, 2021Jun 27, 2021