Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
THREATMODELER ANNOUNCES VERSION 7.2
ThreatModeler has released version 7.2, enhancing its cybersecurity tools with several key features. The update includes improved predictive analytics...
Unleashing Efficiency: Automating Security for Cost & Time
All organizations experience a constant barrage of cyber attacks—from sophisticated exploits to varied and increasingly complex vulnerabilities...
ThreatModeler Raises $60 Million from Invictus Growth Partners
ThreatModeler, the world’s leading threat modeling platform, has secured $60 million in its first institutional financing from Invictus Growth...
ThreatModeler Software Inc. Wins 2024 Fortress Cybersecurity Award
Jersey City, NJ – May 30, 2024 – ThreatModeler announced it has been named a winner in the prestigious 2024 Fortress Cybersecurity Award presented by...
ThreatModeler Unveils New Guide: “Cloud Threat Modeling For Dummies, ThreatModeler Special Edition”
ThreatModeler has released a new guide, "Cloud Threat Modeling For Dummies, ThreatModeler Special Edition," designed to help organizations implement a...
Securing Infrastructure as Code: Identifying and Assessing Threats with Threat Modeling
The attention raised by cloud computing has given birth to DevSecOps, which is a development methodology where collaboration and automation between...
From Breach to Blueprint: Leveraging Threat Modeling to Unpack the 23andMe Cyberattack
By Nikunj Nagalia, VP of Solutions Architecture Amidst the tumultuous year of 2023, 23andMe found itself ensnared in a harrowing breach, compromising...
ThreatModeler Winner of the Coveted Global InfoSec Awards 2024
ThreatModeler Software, Inc. Wins Trailblazing Threat Modeling IN 12th Annual Global InfoSec Awards at #RSAC 2024 SAN FRANCISCO (BUSINESSWIRE) MAY 6...
Secure Supply Chain 2024: Threat Modeling Vendor Risks
Secure Your Supply Chain in 2024: Identifying Third-Party Vendor Risks With Threat Modeling In this blog post, we will discuss how to strengthen your...