Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Threat Hunting Skills Can Boost Your Cybersecurity Career
Every year, cybercrime continues to increase. Consider the annual Internet Crime Report released by the FBI’s Internet Crime Center (IC3) in March...
The Role That Threat Modeling Plays in the DevOps Security Process
There’s little disagreement that security should be baked into every step of the DevOps lifecycle. In fact, there’s even a name for it: DevSecOps. So...
14 Tips For Developing An Effective System For Managing Remote Tech Equipment
When companies and organizations shifted to remote work arrangements in response to the Covid-19 pandemic, leadership teams may have viewed it as a...
Why Threat Modeling is Essential in Evaluating Policy-Driven Security
Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by...
Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories.
Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories. Read the full article...
CIRQ Announces ISO 27001 Certification of ThreatModeler Software
The Certification Institute for Research Quality (CIRQ), an International Standards Organization (ISO) audit and certification body that is a...
Why DevOps Teams are Using Threat Modeling to Secure Their Infrastructure as Code
Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather...
How Threat Modeling Improves Cloud Infrastructures With Continuous Cloud Security
It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security. But...
An Overview of the Evolution of Threat Modeling
As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its...