Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
ThreatModeler 6.0 now available with features to simplify threat modeling for developers
The threat modeling and security cloud infrastructure company, ThreatModeler, has announced the general availability of ThreatModeler 6.0. This...
ThreatModeler Announces Version 6.0, Bringing New Features and Significant Enhancements to Its Comprehensive Threat Modeling Platform
Read More Here: https://thecyberwire.com/newsletters/daily-briefing/11/176...
ThreatModeler Announces Version 6.0
ThreatModeler announced the release of ThreatModeler 6.0, a platform update bringing several new capabilities to bolster and streamline the threat...
How Threat Modeling Can Help Catch Three Common Flaws In IoT Architectures
Modern software development involves selecting and integrating tens or hundreds of complex components, services and infrastructure to deliver systems...
Pen Testing Evolves for the DevSecOps World
Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat...
Cybersecurity Demand is Driving Upskilling Among Technologists
Despite concerns from some quarters about tech layoffs and a possible recession, hiring cybersecurity workers remains a top priority for many...
Threat Modeling: It’s not Just for IT Anymore
There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true...
Can Threat Modeling Really Help Fight Cyber Burnout?
Cyber burnout is a real thing. What it is? What exactly is cyber burnout or cyber fatigue? According to Stacy Thayer, speaking at blackhat 2022...
How Threat Modeling is Being Reinvented Today
Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you...