Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

SD Times logo

ThreatModeler 6.0 now available with features to simplify threat modeling for developers

The threat modeling and security cloud infrastructure company, ThreatModeler, has announced the general availability of ThreatModeler 6.0. This...
cyberwire logo

ThreatModeler Announces Version 6.0, Bringing New Features and Significant Enhancements to Its Comprehensive Threat Modeling Platform

Read More Here: https://thecyberwire.com/newsletters/daily-briefing/11/176...
Global Security Mag logo

ThreatModeler Announces Version 6.0

ThreatModeler announced the release of ThreatModeler 6.0, a platform update bringing several new capabilities to bolster and streamline the threat...
forbes logo

How Threat Modeling Can Help Catch Three Common Flaws In IoT Architectures

Modern software development involves selecting and integrating tens or hundreds of complex components, services and infrastructure to deliver systems...

Pen Testing Evolves for the DevSecOps World

Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat...
dice logo

Cybersecurity Demand is Driving Upskilling Among Technologists

Despite concerns from some quarters about tech layoffs and a possible recession, hiring cybersecurity workers remains a top priority for many...
office computers on a table

Threat Modeling: It’s not Just for IT Anymore

There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true...
large stack of papers

Can Threat Modeling Really Help Fight Cyber Burnout?

Cyber burnout is a real thing. What it is? What exactly is cyber burnout or cyber fatigue? According to Stacy Thayer, speaking at blackhat 2022...
interconnected gears

How Threat Modeling is Being Reinvented Today

Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you...