Cyber Risk Management

Attack Surface Analysis the key to Cyber Risk Management

The role of the CISO is continuing to evolve. Originally CISOs were expected to be tech-savvy security subject matter experts. Today organizations are requiring their CISOs to be business-savvy experts at cyber risk management also. Singularly either one of these functions would constitute a full-time challenge. In combination, they would drive even the most proficient[…]

ThreatModeler Benefits

How ThreatModeler Benefits Key Stakeholders

ThreatModeler Benefits for… Executives / CISOs With ThreatModeler, they’re able to: Meet application security policy objectives by adopting a scalable, repeatable, collaborative, and automated process organization-wide to promote consistency, enforce security requirements, and reduce overall risk exposure. Map application security policies to security requirements to drive, track, and measure security initiatives using dashboards, reports, trends,[…]

Threat Modeling - Past Present Future

Threat Modeling: Past, Present and Future

Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts based on the technical and business impact these threats pose to your organization, should they be carried out. Threat modeling is rapidly gaining momentum and in this post, we[…]

ThreatModeler vs Microsoft TMT - Microsoft threat modeling tool

Comparing ThreatModeler to Microsoft Threat Modeling Tool (TMT)

Recently, several requests have been made by members of the security community asking that MyAppSecurity provide a comparison between our product offering, ThreatModeler, the industry’s first automated, collaborative, scalable, and repeatable threat modeling solution, and Microsoft’s TMT, Microsoft threat modeling tool, which was released in April of 2014. Even though the methodologies and functional designs[…]