ThreatModeler Announces Version 7.0

ThreatModeler Announces Version 7.0

Bringing Machine Learning and AI, Real-Time Collaboration, and Customized Risk Calculation to the Process of Automated Threat Modeling New features substantially simplify and ensure wider adoption of automated, real-time threat modeling to enable DevOps and security...
The Top 3 Questions to Ask a Threat Modeling Vendor

The Top 3 Questions to Ask a Threat Modeling Vendor

Purchasing a threat modeling tool can be intimidating. For starters, most people who need threat modeling aren’t threat modeling experts. To compound matters, there are even fewer people who keep up on threat modeling capabilities. What may have been considered...
Secure Online Banking

Secure Online Banking

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
DevSecOps & Automated Threat Modeling for Federal Agencies

DevSecOps & Automated Threat Modeling for Federal Agencies

ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the labor intensive manual process of threat modeling. Those charged with proactively managing NIST 800-53 Rev. 5...
Advantages of Modular Threat Modeling

Advantages of Modular Threat Modeling

Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages these to great advantage in reusing these patterns in threat modeling. Be it either components or templates of groups...