Threat Modeling for Linux Containers (LXC), Docker and the Cloud
vimeo01.01.1970
Traditional threat modeling has utilized data flow diagrams to model the software or system in question. How well does that methodology work for complex and interconnected…