Using threat modeling featured in new OWASP WAPT
This will be something to look forward to. I have not seen much of the theory of threat modeling end-to-end put into practice effectively or completely. And much of what I have seen of threat modeling really should be baked into the SDLC process and something that project teams do as part of normal development efforts (why are security people doing separate data flow diagrams, for example?).
From Threatsandcountermeasures:
The next release of the OWASP Web Application Penetration Test (WAPT) guide will include a section on using threat modelling effectively