Release Summary

New guidance from ISACA and SecurityScorecard gives a step-by guide to apply application threat modeling principles to data.