Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Behind the AWS Shared Responsibility Model and Today’s Cloud Threats
It's no secret that Amazon Web Services (AWS) helps to run a wide swath of the web's most popular websites, services, and applications. However, the...
Twitter Is the Latest Victim of a Rapidly-Growing Cybersecurity Threat: Insider Attacks
Many in the cybersecurity world spend their entire careers trying to prevent the kind of high-profile, reputation-wrecking cyberattack such as what...
Six Steps to Threat Modeling for Secure Data Assets
For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building...
A Day In the Life of a Threat Research Engineer
With the COVID-19 pandemic impacting us worldwide and showing no signs of letting up, many cybersecurity professionals are working remotely, and...
How to Automate and Accelerate the Design of Secure AWS Cloud Environments
For this ThreatModeler Blog Special Edition, we recap our Fireside Chat (with link to the webcast) moderated By Ty Sbano, Chief Security & Trust...
Recap: ThreatModeler at Open Security Summit and New White Paper
The annual, five-day Open Security Summit is unique on the Information Security conference calendar as it entails security practitioners coming...
How VPCs Work, and How to Integrate Them Into Identity Access Security
While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public...
How Threat Modeling Can Remove Security Blockers On Your Journey to the Cloud
There's no shortage of content on the internet that extolls the great virtues of cloud computing. And they're largely correct. The cloud offers...
Threat Modeling: Are Data Flow Diagrams Enough?
As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled:...