We are excited to announce the launch of our ThreatModeler Certified Practitioner Program - Introduction to Threat Modeling partnering with New York University's Tandon School of...
Blog
Empowering Women in Technology – International Women’s Day 2024
This International Women's Day, let's challenge the outdated narrative that has held back countless women in technology. The myth that women are somehow less capable in technical...
ThreatModeler Announces Version 7.0
Bringing Machine Learning and AI, Real-Time Collaboration, and Customized Risk Calculation to the Process of Automated Threat Modeling New features substantially simplify and...
ThreatModeler Transforms Automotive Security by Bringing Free, Industry-Specific Threat Models to its Growing Marketplace
đźš—đź”’ Exciting News! ThreatModeler is revolutionizing automotive security with 18 cutting-edge threat models tailored for the automotive industry.Pre-built, vetted threat models are...
The Best Cyber Insurance is Not What You Think
Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew by 100% in the past three years while claims closed with...
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative for proactive risk assessment...
Why Threat Modeling?
Everyone involved in application development would rather prevent an incident than have to respond to one. The adage, an ounce of prevention…does apply. That’s where threat...
Can You Code Your Way to Cybersecurity?
Yes, coding skills are highly valuable in the field of cybersecurity. Being able to write and understand code allows cybersecurity professionals to analyze, identify, and...
One Good Way to Know if Developers are Developing Secure Code
There was a time when developing secure code was just a good idea. Now, in many instances, it’s a requirement. But how do you know if a developer is developing secure...
Agile Development: What You Need to Know
Everyone is a fan of agile development. And while there are many benefits to adopting an agile methodology, one of the most important is that it speeds up software development....
Vulnerability management, its impact and threat modeling methodologies
This recent article from Security Intelligence emphasizes the significance of vulnerability management in cybersecurity, outlining its continuous process of identifying and...
Understanding Live Cloud Environment and Threat Modeling
Cloud adoption is on the rise. And thanks to the pandemic, the rate of adoption is accelerating. Worth an already impressive $445.3 billion in 2021, the global cloud computing...
Where are You in Your Threat Modeling Journey?
We like to say that to do it right, threat modeling cannot be a one-time project. Your threat modeling journey must be an ongoing process. In that same way, if you do it right,...
6 Steps to Threat Model with Infrastructure as Code
When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security risks. Here are some key steps to threat model effectively:...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
ThreatModeler©, a leader in threat modeling from design to code to cloud, today announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures...
ThreatModeler Launched IaC-Assist 2.0
ThreatModeler© announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures infrastructure-as-code (IaC) at the development stage to ensure...
It pays to malvertise. MOVEit vulnerability remediation. Ransomware trends. FSB cyberespionage. Influence operators taken down.
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0 (PR Newswire) ThreatModeler©, a leader in threat modeling from design to code to...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
ThreatModeler, a leader in threat modeling from design to code to cloud, announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures...
ThreatModeler Releases IaC-Assist 2.0
ThreatModeler announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures infrastructure-as-code (IaC) at the development stage to ensure...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
Patented one-click solution detects security controls, applies mitigations, and ensures compliance for Terraform, CloudFormation, and other IaC tools JERSEY CITY, N.J., July 20,...