Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

dice logo

Threat Hunting Skills Can Boost Your Cybersecurity Career

Every year, cybercrime continues to increase. Consider the annual Internet Crime Report released by the FBI’s Internet Crime Center (IC3) in March...
lock icon over a city

The Role That Threat Modeling Plays in the DevOps Security Process

There’s little disagreement that security should be baked into every step of the DevOps lifecycle. In fact, there’s even a name for it: DevSecOps. So...
forbes logo

14 Tips For Developing An Effective System For Managing Remote Tech Equipment

When companies and organizations shifted to remote work arrangements in response to the Covid-19 pandemic, leadership teams may have viewed it as a...
person writing on a document

Why Threat Modeling is Essential in Evaluating Policy-Driven Security

Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by...
cyberwire logo

Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories.

Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories. Read the full article...
ThreatModeler offers an array of important resources to enterprises leveraging threat modeling for advanced security and compliance

CIRQ Announces ISO 27001 Certification of ThreatModeler Software

The Certification Institute for Research Quality (CIRQ), an International Standards Organization (ISO) audit and certification body that is a...
person working with computers at desk

Why DevOps Teams are Using Threat Modeling to Secure Their Infrastructure as Code

Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather...
clouds in the sky

How Threat Modeling Improves Cloud Infrastructures With Continuous Cloud Security

It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security. But...
construction site

An Overview of the Evolution of Threat Modeling

As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its...