Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

blog_post_header

How Threat Modeling Can Help You Migrate Securely to the Cloud

Security during cloud migration would be a challenge even if it were done all at once. Since smart cloud migration is done in steps, security during...
How Developers Can Easily Learn to do Threat Modeling image

How Developers Can Easily Learn to do Threat Modeling

What’s the easiest way to learn anything new? Don’t start from scratch. This means employing three strategies: 1) Use the skills you already have 2)...
DevSecOps-&-Automated-Threat-Modeling-for-Federal-Agencies

DevSecOps & Automated Threat Modeling for Federal Agencies

ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the...
chained keyboard

Advantages of Modular Threat Modeling

Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages...
ThreatModeler enables DevOps to build security into applications with one click threat modeling

What Is One-Click Cloud Threat Modeling?

A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due to...
Unify cloud and AppSec DevOps with ThreatModeler and Avocado

How to Automate Threat Modeling Using ThreatModeler and Avocado

This is a recap of the "Automated Threat Modeling For Applications Using Avocado" webinar presented recently. To view the entire webinar (including a...
Security Orchestration Automation Response

What is SOAR and How Does It Help Secure Enterprises?

This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below:...
ThreatModeler drives security in your journey to the cloud with automation

Accelerating Your Cloud Journey With Security Built In

The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to...
ThreatModeler expounds on the shared responsibility model and how to secure against attack vectors.

Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

It's no secret that Amazon Web Services (AWS) helps to run a wide swath of the web's most popular websites, services, and applications. However, the...