Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks California 28

Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks

Many in the cybersecurity world spend their entire careers trying to prevent the kind of high-profile, reputation-wrecking cyberattack such as what...
ThreatModeler blog post on securing your data assets

Six Steps to Threat Modeling for Secure Data Assets

For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building...
Blog post on a day in the life of a threat modeler

A Day In the Life of a Threat Research Engineer

With the COVID-19 pandemic impacting us worldwide and showing no signs of letting up, many cybersecurity professionals are working remotely, and...
Fireside chat recap on secure migrations to AWS cloud with ThreatModeler

How to Automate and Accelerate the Design of Secure AWS Cloud Environments

For this ThreatModeler Blog Special Edition, we recap our Fireside Chat (with link to the webcast) moderated By Ty Sbano, Chief Security & Trust...
DFD vs. PFD white paper and ThreatModeler at Open Security Summit

Recap: ThreatModeler at Open Security Summit and New White Paper

The annual, five-day Open Security Summit is unique on the Information Security conference calendar as it entails security practitioners coming...
Securing VPC with IAM in AWS

How VPCs Work, and How to Integrate Them Into Identity Access Security

While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public...
Prevent Security as a Blocker with Automated Threat Modeling

How Threat Modeling Can Remove Security Blockers On Your Journey to the Cloud

There's no shortage of content on the internet that extolls the great virtues of cloud computing. And they're largely correct. The cloud offers...
Why threat modeling with process flow diagrams is better.

Threat Modeling: Are Data Flow Diagrams Enough?

As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled:...
How Security and Compliance Teams Can Collaborate and Thrive in the Cloud

Differentiating Compliance and Security for AWS Development

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key...