The Tutamantic team is eager to provide short articles on real-world tips,
tricks and guidance on how to execute on good application-design security
practices. This has led to the birth of this blog.
Threat modeling is still considered by many to be an overbearing,
manually-intensive and difficult activity. Tutamantic is