Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks
Many in the cybersecurity world spend their entire careers trying to prevent the kind of high-profile, reputation-wrecking cyberattack such as what...
Six Steps to Threat Modeling for Secure Data Assets
For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building...
A Day In the Life of a Threat Research Engineer
With the COVID-19 pandemic impacting us worldwide and showing no signs of letting up, many cybersecurity professionals are working remotely, and...
How to Automate and Accelerate the Design of Secure AWS Cloud Environments
For this ThreatModeler Blog Special Edition, we recap our Fireside Chat (with link to the webcast) moderated By Ty Sbano, Chief Security & Trust...
Recap: ThreatModeler at Open Security Summit and New White Paper
The annual, five-day Open Security Summit is unique on the Information Security conference calendar as it entails security practitioners coming...
How VPCs Work, and How to Integrate Them Into Identity Access Security
While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public...
How Threat Modeling Can Remove Security Blockers On Your Journey to the Cloud
There's no shortage of content on the internet that extolls the great virtues of cloud computing. And they're largely correct. The cloud offers...
Threat Modeling: Are Data Flow Diagrams Enough?
As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled:...
Differentiating Compliance and Security for AWS Development
How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key...