Smart Home Threat Model

Smart Home Threat Model – Threat Model of the Month

Organizations may need to consider a broader cyber ecosystem than their deployed on-premises and cloud-based systems, according to Intel Security’s Christopher Young who addressed the issues at the recent RSA Conference 2017.[i] Smart homes are increasingly becoming a part of organization’s comprehensive attack surface[ii] as more employees take the opportunity to work from home. A[…]

Cyber Risk Management

Attack Surface Analysis the key to Cyber Risk Management

The role of the CISO is continuing to evolve. Originally CISOs were expected to be tech-savvy security subject matter experts. Today organizations are requiring their CISOs to be business-savvy experts at cyber risk management also. Singularly either one of these functions would constitute a full-time challenge. In combination, they would drive even the most proficient[…]

Application Threat Model PFD - Threat Modeling

Application Threat Modeling vs Operational Threat Modeling

Threat modeling is no longer just a theoretical exercise. It is rapidly evolving into a practical process by which organizations can be proactive in their security efforts. By identifying threats early in the design phase and prioritizing mitigation efforts in alignment with strategy and budget allocations, organizations realize both their security and business goals. This[…]

ThreatModeler Benefits

How ThreatModeler Benefits Key Stakeholders

ThreatModeler Benefits for… Executives / CISOs With ThreatModeler, they’re able to: Meet application security policy objectives by adopting a scalable, repeatable, collaborative, and automated process organization-wide to promote consistency, enforce security requirements, and reduce overall risk exposure. Map application security policies to security requirements to drive, track, and measure security initiatives using dashboards, reports, trends,[…]