realistic modeling

ThreatModeler vs. TMT – Realistic Modeling

In our previous articles comparing ThreatModeler™ and Microsoft’s Threat Modeling Tool (TMT), we considered the tools from an AppSec perspective and the CISO’s perspective. In this installment, we compare the capacity of each threat modeling tool to provide outputs based on realistic modeling of a modern enterprise IT environment as embodied by an online banking[…]

Information Security for GDPR Compliance

Information Security for GDPR Compliance

When it comes to information security for GDPR compliance, all stakeholders across the organization need to be involved. The General Data Protection Regulation – the European Union’s upgrade of the current Data Protection Direction – is one of the most sweeping overhauls of data protection the world has ever seen. Not only does GDPR come[…]

Data Discovery for GDPR

Data Discovery for GDPR Compliance

Come May 25, 2018 companies doing business with persons living in the European Union must demonstrate compliance with the new General Data Protection Regulation (GDPR). An inability to demonstrate compliance could expose the company to a minimum fine of €10M, and go as high as 4% of the company’s worldwide revenues of the preceding year.[…]

Analyze Endpoint Security

Analyze Endpoint Security with ThreatModeler

The need to analyze endpoint security is becoming an increasing important for organizations. Layered network security defenses are difficult to penetrate. However, once inside the perimeter, legitimate users and adversaries alike have much more freedom of movement. Thus the growing preference for adversarial actors is to conscript the aid of careless or disgruntled insiders –[…]