When companies and organizations shifted to remote work arrangements in response to the Covid-19 pandemic, leadership teams may have viewed it as a temporary situation. “Tech plans” in the beginning may have simply consisted of noting which employees had taken home a computer to work on.

++

IT leaders should keep security top of mind when managing technology by onboarding tools that enable a holistic understanding of exactly who has access to what, at any given level of access. As businesses become increasingly remote and cloud-oriented, employees should also be encouraged to coordinate with IT staff in vetting processes that will help the IT team maintain an understanding of every connected endpoint. – Archie Agarwal, ThreatModeler Software, Inc.

Read the full article here

If you’d like to learn more about ThreatModeler’s capabilities, you can contact us here.

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >