Staying on top of the Threat Landscape

Make Threat Intelligence Actionable

Today’s enterprises receive a myriad of new threat intelligence from multiple feeds and sources. Most organizations highly value such threat intelligence as essential to a strong security posture and fulfilling their security mission. It can be challenging, however, to make threat intelligence actionable. With the plethora of new threats added daily to the cyber ecosystem,[…]

71799735 - cybersecurity and information technology security services concept. login or sign in internet concepts.

Helping Boards Understand Cybersecurity

According to recent Harvard research, cybersecurity is one of the greatest challenges corporate boards face, and yet it is the area in which they consider themselves least prepared to manage.[i] However, Cybersecurity is a significant and growing issue for enterprises. Gartner estimates that spending on information security reached $81.6 billion in 2016;[ii] and in the[…]

ThreatModeler vs Microsoft TMT - Microsoft threat modeling tool

Comparing ThreatModeler to Microsoft Threat Modeling Tool (TMT)

Recently, several requests have been made by members of the security community asking that MyAppSecurity provide a comparison between our product offering, ThreatModeler, the industry’s first automated, collaborative, scalable, and repeatable threat modeling solution, and Microsoft’s TMT, Microsoft threat modeling tool, which was released in April of 2014. Even though the methodologies and functional designs[…]

Successful Threat Modeling Practice - Indicators of Success from Threat Modeling

5 Characteristics of a Successful Threat Modeling Practice

Our past blog posts have covered why organizations need to implement threat modeling and make it an ongoing process, versus treating it as a one-time exercise, and also how IT executives, along with other key stakeholders, benefit from a scalable and repeatable threat modeling practice. Over the past few years a handful of methodologies and[…]