Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

enterprise security tech logo

Data Privacy: Experts Share How Far We’ve Come and How Far We Have to Go

Data Privacy Day occurs each year on January 28 and was created to raise awareness and promote privacy and data protection best practices. Data...
security logo

Data Privacy Week: Raising Awareness and Encouraging Compliance

Data Privacy Day is not just a day anymore. For the first time, it’s Data Privacy Week — a week-long effort to empower individuals and enterprises...
VMblog logo

Data Privacy Day 2022: Views and Tips from Top Industry Experts

Data Privacy Day, an international "holiday" that occurs each year on January 28, was created to raise awareness and promote privacy and data...
Betanews logo

Data Privacy Day aims to raise awareness of how we collect and use data

Today is Data Privacy Day -- or Data Protection Day, depending on who you talk to -- a day dedicated to an international effort to raise awareness...
Medium logo

Threat Modeling — The Short Version

Threat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization of...
Medium logo

What Is DevSecOps?

DevSecOps – short for development, security and operations – combines separate traditional development, security and operations functions to increase...
security boulevard logo

Vulnerability Disclosures Rise to Meet Federal Requirements

For all its other security milestones, 2021 was the year that vulnerability disclosures began to get their due, taking on greater importance across...
THP logo

How Does Threat Modeling Work in Software Development?

Question: How does risk modeling work in software improvement? Archie Agarwal, founder and CEO, ThreatModeler: Threat modeling is the method of...
A Cybersecurity Checklist for the New Year Threat Assessment Vs Threat Modeling Whats The Difference

Threat Assessment vs Threat Modeling: What’s the Difference?

While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different...