Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

forbes logo

Investing In A Thorough Understanding Of Your Threat Surface

Today, cyberattacks have become a frequent and sobering reality for business leaders and consumers alike. They’ve affected just about every industry...
Cybersecurity Dive logo

The Value of Threat Modeling in an Evolving Security Landscape

Even though threat modeling plays a vital role in addressing cyberattacks, many companies were slow to adopt the cybersecurity tool. Threat modeling...
ThreatModeler offers an array of important resources to enterprises leveraging threat modeling for advanced security and compliance

ThreatModeler Launches IaC-Assist and CloudModeler to Reduce Threat Drift from Code to Cloud

ThreatModeler, a leader in securing cloud infrastructure from design to deployment, today announced the launch of IaC-Assist and CloudModeler...
Aws Re Invent Its Not Too Late To Attend

AWS re:Invent: It’s Not Too Late to Attend

People and organizations generally want to begin the new year with a clean house. That includes organizations seeking enterprise transformation...
technews word logo

Bugcrowd Reports Ethical Hackers Prevented $27B in Cybercrime

Over the last year, ethical hackers have prevented more than US$27 billion in cybercrime, according to a report released Tuesday by a leading bug...
Don’t Overlook This Booth #1626 at AWS Reinvent Dont Overlook This Booth 1626 At Aws Reinvent 1

Don’t Overlook This Booth #1626 at AWS Reinvent

Are you heading over to AWS Reinvent in Las Vegas, November 29 – December 3, 2021? If so, then there’s a booth you’re going to want to visit...
ZD Net logo

Security Company Faces Backlash for Waiting 12 Months to Disclose Palo Alto 0-Day

There has been considerable debate within the cybersecurity community about Randori, a security firm that waited one year before disclosing a critical...
SC media logo

Zero-Day Vulnerability Found in Palo Alto VPN

Researchers on Wednesday discovered a zero-day buffer overflow vulnerability that causes an unauthenticated remote code execution on Palo Alto...
Thrreatpost logo

Cyber-Mercenary Group Void Balaur Attacks High-Profile Targets for Cash

A Russian-language threat group is available for hire, to steal data on journalists, political leaders, activists and from organizations in every...