PinnedAshish ShrivastavaThreat modeling for OAuth 2.0In this post I am trying to explain OpenID Connect and OAuth 2.0 Threat Model and Security Considerations and Best Practices check list.7 min read·Jun 27, 2021----
Ashish ShrivastavaMedical Device Cybersecurity: Cybersecurity to the Next Level from the FDA’s viewWhat You Need to Know, Safeguards and Challenges7 min read·Dec 5, 2021----
Ashish ShrivastavaRansomware on the Rise : How threat Intelligence help to Identify.Ransomware is a growing large problem around the world. It’s one of problem that require preparation. Ransomware has become one of the…13 min read·Sep 3, 2021----
Ashish ShrivastavaPrepare for Zero Trust, Security Model at the organizational level: Foundations and ImplementationThe increasing usage of cloud-based services, mobile computing, internet of things (IoT), and bring your own device (BYOD) in the industry…9 min read·Aug 3, 2021----
Ashish ShrivastavaThreat modeling for OpenID Connect and OAuth 2.0Threat Patterns and Attack find in OAuth2.0 & OpenID Connect along with countermeasures and security best practices.8 min read·Jun 27, 2021----