Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Empowering Women in Technology – International Women’s Day 2024
This International Women's Day, let's challenge the outdated narrative that has held back countless women in technology. The myth that women are...
ThreatModeler Announces Version 7.0
Bringing Machine Learning and AI, Real-Time Collaboration, and Customized Risk Calculation to the Process of Automated Threat Modeling New features...
Revolutionizing Automotive Security: ThreatModeler Introduces Free, Tailored Threat Models
Exciting News! ThreatModeler is revolutionizing automotive security with 18 cutting-edge threat models tailored for the automotive industry...
The Best Cyber Insurance is Not What You Think
Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew by 100% in the past three years...
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative...
Why Threat Modeling?
Everyone involved in application development would rather prevent an incident than have to respond to one. The adage, an ounce of preventiondoes...
Can You Code Your Way to Cybersecurity?
Yes, coding skills are highly valuable in the field of cybersecurity. Being able to write and understand code allows cybersecurity professionals to...
One Good Way to Know if Developers are Developing Secure Code
There was a time when developing secure code was just a good idea. Now, in many instances, it’s a requirement. But how do you know if a developer is...
Agile Development: What You Need to Know
Everyone is a fan of agile development. And while there are many benefits to adopting an agile methodology, one of the most important is that it...