ThreatModeler's Caption Contest

ThreatModeler’s Caption Contest – What’s Your Smart TV Watching Tonight?

ThreatModeler’s Caption Contest What’s Your Smart TV Watching Tonight? In an effort to educate consumers about the collateral damage that comes from various types of data breaches, we’ve launched a humorous caption contest series to bring more awareness to cybersecurity and threat modeling. We’re kicking off our first of many caption contests with the question:[…]

3 Pillars of a Scalable Threat Modeling Practice - Diagram

Three Pillars of a Scalable Threat Modeling Practice

When threat modeling first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel resource was considered acceptable. However, now that regulatory pressures and financial consequences are pushing threat modeling into the information security mainstream, organizations are discovering the practical limitations of their traditional threat modeling process.[…]

Application Threat Model PFD - Threat Modeling

Application Threat Modeling vs Operational Threat Modeling

Threat modeling is no longer just a theoretical exercise. It is rapidly evolving into a practical process by which organizations can be proactive in their security efforts. By identifying threats early in the design phase and prioritizing mitigation efforts in alignment with strategy and budget allocations, organizations realize both their security and business goals. The[…]

Application Threat Model PFD - Process Flow Diagram

Threat Modeling – Data Flow Diagram vs Process Flow Diagram

Threat modeling was first conceived as a process by which potential threats to an application could be proactively identified before the application was even developed, and appropriate mitigating controls could then be considered for implementation. Traditionally, threat models are built using a data flow diagramming (DFD) process. Yet as threat modeling has evolved to include[…]