realistic modeling

ThreatModeler vs. TMT – Realistic Modeling

In our previous articles comparing ThreatModeler™ and Microsoft’s Threat Modeling Tool (TMT), we considered the tools from an AppSec perspective and the CISO’s perspective. In this installment, we compare the capacity of each threat modeling tool to provide outputs based on realistic modeling of a modern enterprise IT environment as embodied by an online banking[…]

Outputs Beyond AppSec

ThreatModeler vs. TMT – Outputs Beyond AppSec

Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases application security is a critical priority. In our previous article comparing Microsoft’s Threat Modeling Tool (TMT) to ThreatModeler™, we considered several key factors to securing applications at the speed and scale of modern DevOps teams.[…]

Analyze Endpoint Security

Analyze Endpoint Security with ThreatModeler

The need to analyze endpoint security is becoming an increasing important for organizations. Layered network security defenses are difficult to penetrate. However, once inside the perimeter, legitimate users and adversaries alike have much more freedom of movement. Thus the growing preference for adversarial actors is to conscript the aid of careless or disgruntled insiders –[…]

secure online banking

Secure Online Banking with Threat Modeling

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[i] Customer financial records and associated personally identifying information are high-value commodities on the dark web. Nonetheless, consumers expect banks and other financial institutions to provide secure online services and access. Creating sufficiently[…]