Oct 1, 2019 | Attack Surface Analysis, DevSecOps, Threat Modeling Process, Threat Modeling Tools
Within the context of information security, application threat modeling seeks to identify, understand and communicate threat information to security decision makers. Threat modeling can be used to secure system networks, applications, mobile, web, Internet of Things...
Sep 26, 2019 | Attack Surface Analysis, CISO, DevSecOps, Events, Methodology, Threat Modeling Process
On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit. Alex Bauert, CISSP, CSSLP – ThreatModeler’s Senior Director of Threat Research – sat alongside esteemed Tech Accord panel...
Sep 17, 2019 | Attack Surface Analysis, Risk Management, ThreatModeler
Threat, vulnerability and risk are terms that are inherent to cybersecurity. But oftentimes, organizations get their meanings confused. It is crucial for infosec managers to understand the relationships between threats and vulnerabilities so they can effectively...
Sep 10, 2019 | Attack Surface Analysis, DevSecOps, Methodology, Threat Modeling Process, Threat Modeling Software
Here at ThreatModeler HQ, we’ve had conversations with customers recently, each telling a similar story. Business owners are signing exceptions to launch products without conducting a complete risk analysis. The reason? Project leaders invested time in manual threat...
Sep 5, 2019 | Attack Surface Analysis, Recent News, Threat Modeling
Securing the 2020 US state, federal and presidential elections against cyberattacks became the topic of serious discussion for both the private and public sector this week. Within the context of elections cybersecurity, threat modeling is a top priority for technology...
Sep 3, 2019 | Attack Surface Analysis, Cloud security, Cyber Risk, Threat Modeling
SQL injections are a malicious form of cyberattack in which hackers insert malicious code into database servers. SQL injections can take control of applications and compromise security measures. SQL injections are among the oldest, most common forms of web application...