Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Data Privacy: Experts Share How Far We’ve Come and How Far We Have to Go
Data Privacy Day occurs each year on January 28 and was created to raise awareness and promote privacy and data protection best practices. Data...
Data Privacy Week: Raising Awareness and Encouraging Compliance
Data Privacy Day is not just a day anymore. For the first time, it’s Data Privacy Week — a week-long effort to empower individuals and enterprises...
Data Privacy Day 2022: Views and Tips from Top Industry Experts
Data Privacy Day, an international "holiday" that occurs each year on January 28, was created to raise awareness and promote privacy and data...
Data Privacy Day aims to raise awareness of how we collect and use data
Today is Data Privacy Day -- or Data Protection Day, depending on who you talk to -- a day dedicated to an international effort to raise awareness...
Threat Modeling — The Short Version
Threat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization of...
What Is DevSecOps?
DevSecOps – short for development, security and operations – combines separate traditional development, security and operations functions to increase...
Vulnerability Disclosures Rise to Meet Federal Requirements
For all its other security milestones, 2021 was the year that vulnerability disclosures began to get their due, taking on greater importance across...
How Does Threat Modeling Work in Software Development?
Question: How does risk modeling work in software improvement? Archie Agarwal, founder and CEO, ThreatModeler: Threat modeling is the method of...
Threat Assessment vs Threat Modeling: What’s the Difference?
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different...