4min chapter

Cloud Security Podcast cover image

What is SBOM, iBOM?

Cloud Security Podcast

CHAPTER

The Ee Bomb and the S Bomb on Threat Modelling

threat modelling is usually happening very late in the game, when you have a provision infra structure. You can querry, do i have a vulnerable public based on code only, without provisioning anything to production. There would be an indebect trg analysis of the emtan application. It gets into a very big chek list for a threet year web application like the cosecury potcas web side. Do you think that weare being idealistic by the going on the spot? In a lot of ways, it sounds like a lot of work, but it also seems, is that really practical as well? O, i may totally make sense, but how many

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode