Why it’s Important to Build a Threat Modeling Culture

Why it’s Important to Build a Threat Modeling Culture

There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand the difference requires an analogy. Imagine threat modeling as bodybuilding. Building a threat model would be your...
ThreatModeler Announces New Patent for IaC-Assist

ThreatModeler Announces New Patent for IaC-Assist

First of its kind, ThreatModeler’s newly patented technology solution makes the IaC-Assist a proprietary technology – allowing users to truly shift left. ThreatModeler, a leader in securing cloud infrastructure from design to deployment, today announced the...
Cut Risk Analysis Costs Through Automated Threat Modeling

Cut Risk Analysis Costs Through Automated Threat Modeling

Here at ThreatModeler HQ, we’ve had conversations with customers recently, each telling a similar story. Business owners are signing exceptions to launch products without conducting a complete risk analysis. The reason? Project leaders invested time in manual threat...
ThreatModeler at BlackHat 2019 Cybersecurity Conference

ThreatModeler at BlackHat 2019 Cybersecurity Conference

Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security experts, hackers, researchers, and vendors, ThreatModeler management attended in full force. This was the first year...
Secure DevOps Starts With Threat Modeling Software

Secure DevOps Starts With Threat Modeling Software

Maintaining a secure DevOps environment is crucial for protecting the private, confidential data maintained by your organization. This rule of thumb applies to DevOps through all stages from design to production. DevOps involves the planning, designing, creating,...
4 Ways Threat Modeling Can Enhance DevOps Security

4 Ways Threat Modeling Can Enhance DevOps Security

DevOps – the rapid development and deployment of an organization’s applications and services – plays an integral part in the overall security of critical data. Every change put forth by DevOps teams changes the threat landscape, potentially opening systems up to new...