threat modeling outputs needed

Getting the Threat Modeling Outputs Needed

Many security professionals are die-hard Microsoft Threat Modeling Tool (TMT) fans. After all, it is free, and there are no limits from Microsoft on the number of users or threat models you are allowed to make. Moreover, perhaps most importantly – they have been using TMT since they were first introduced to threat modeling. TMT[…]

IoT Cybersecurity

Shadow IT and IoT Cybersecurity

White House Cybersecurity Coordinator Rob Joyce says IoT cybersecurity is a significant issue. In part, the issue is caused by a lack of responsible party. According to Joyce, it is difficult at best to know who is patching what and who is responsible for security. The proliferation of IoT devices that connect to or interact[…]

Threat Modeling is for Everyone

Threat Modeling is for Everyone, even Playground Kids

Threat modeling – in its simplest form – is about looking at a system or situation from an adversary’s perspective. From that unique perspective it is possible to identify specific potential threats that otherwise would not be considered by non-adversaries. A threat model, then, is an analytical approach to understanding the potential threats by which[…]

Prepared for Crash Override

Be Prepared for Crash Override with ThreatModeler

The susceptibility of electrical grids around the world came into sharp focus on June 8 as the hacker group known as Electrum used a malware bundle dubbed CRASH OVERRIDE to disrupt power distribution in Kiev, Ukraine. The many similarities of electrical grids across the world, coupled with the malware’s modular framework, had leaders and electrical[…]