Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
How Threat Modeling Can Help You Migrate Securely to the Cloud
Security during cloud migration would be a challenge even if it were done all at once. Since smart cloud migration is done in steps, security during...
How Developers Can Easily Learn to do Threat Modeling
What’s the easiest way to learn anything new? Don’t start from scratch. This means employing three strategies: 1) Use the skills you already have 2)...
DevSecOps & Automated Threat Modeling for Federal Agencies
ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the...
Advantages of Modular Threat Modeling
Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages...
What Is One-Click Cloud Threat Modeling?
A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due to...
How to Automate Threat Modeling Using ThreatModeler and Avocado
This is a recap of the "Automated Threat Modeling For Applications Using Avocado" webinar presented recently. To view the entire webinar (including a...
What is SOAR and How Does It Help Secure Enterprises?
This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below:...
Accelerating Your Cloud Journey With Security Built In
The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to...
Behind the AWS Shared Responsibility Model and Today’s Cloud Threats
It's no secret that Amazon Web Services (AWS) helps to run a wide swath of the web's most popular websites, services, and applications. However, the...