Application Security

Improving DevOps Implementations with Greater Ops Visibility

DevOps creates an environment which may be systemically flawed, in part due to a lack of ops visibility into application post-deployment. Ironically, the fundamental, underlying goal of DevOps is to create an environment in which both developers and operators are … Read More

Architecturally-Based Process Flow Diagrams

Threat modeling is catching on. Increasingly organizations are realizing that securing DevOps projects as early as possible – preferably during the initial white boarding – not only reduces risk, it makes good business sense. For some time now agile DevOps … Read More

Introducing the ThreatModeler JIRA Plugin

SecDevOps is all about pushing security left with tools that automate the integration between security and DevOps teams working in an agile environment. Ideally, that left-shift will go as far as integrating security considerations into the architect’s white boarding stage. … Read More

Secure Online Banking with Threat Modeling

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[i] Customer financial records and associated personally identifying information are high-value commodities on the dark web. Nonetheless, consumers … Read More

How ThreatModeler Benefits Key Stakeholders

ThreatModeler Benefits for… Executives / CISOs With ThreatModeler, they’re able to: Meet application security policy objectives by adopting a scalable, repeatable, collaborative, and automated process organization-wide to promote consistency, enforce security requirements, and reduce overall risk exposure. Map application security … Read More

Threat Modeling: Past, Present and Future

Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts based on the technical and business impact these threats pose to your organization, should … Read More

Comparing ThreatModeler to Microsoft Threat Modeling Tool (TMT)

Recently, several requests have been made by members of the security community asking that MyAppSecurity provide a comparison between our product offering, ThreatModeler, the industry’s first automated, collaborative, scalable, and repeatable threat modeling solution, and Microsoft’s TMT, Microsoft threat modeling … Read More

5 Characteristics of a Successful Threat Modeling Practice

Our past blog posts have covered why organizations need to implement threat modeling and make it an ongoing process, versus treating it as a one-time exercise, and also how IT executives, along with other key stakeholders, benefit from a scalable … Read More

4 Key Reasons Why CISOs Need Threat Modeling

A recent article by CSO magazine highlights key findings from CISOs (Chief Information Security Officers) on how threat modeling helps eliminate blind spots and more complex threat scenarios in their application risk profile. It also provided detail as to how … Read More

7 Benefits of Continuous Threat Modeling

The ever-changing threat landscape requires continuous updating of application threat models, in order for organizations to keep current and to best mitigate their increased risk exposure. Stay current with continuous threat modeling. New attack surfaces and threats are continually introduced, … Read More