IoT Threat Modeling

IoT Threat Modeling for Greater Security

The Internet of Things – or IoT – is growing at an explosive rate. A recent international study sponsored by the US Chamber of Commerce indicates that in just two years as many as 85% of organizations will utilize IoT to add value to their operations.[1] Consumer adoption of connected devices is currently growing by[…]

Analyze Endpoint Security

Analyze Endpoint Security with ThreatModeler

The need to analyze endpoint security is becoming an increasing important for organizations. Layered network security defenses are difficult to penetrate. However, once inside the perimeter, legitimate users and adversaries alike have much more freedom of movement. Thus the growing preference for adversarial actors is to conscript the aid of careless or disgruntled insiders –[…]

Quantifying Compensating Controls

Quantifying Compensating Controls with ThreatModeler

Compensating controls are cyber security mechanisms put in place to satisfy specific security compliance standards for regulatory purposes[i] or to meet a manufacturer’s guidelines.[ii] Such controls are not intended to be less stringent. Rather, the controls must – at a minimum – satisfy the rigor of the original security requirement.[iii] The purpose of compensating controls[…]