Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud

Differentiating Compliance and Security for AWS Development

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key...
DevSecOps and threat modeling

DevSecOps Is Best When Applied in Layers

By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an...
Least Privilege at Scale with ThreatModeler and AWS

Build Threat Models for Least-Privilege at Scale with ThreatModeler and AWS

The premise behind least privilege is simple: if you want to protect your bank vault, start by being very careful about who gets a key. In the...
Addressing the DevSecOps Conundrum

Addressing the DevSecOps Dysfunction In Your Cloud

There is a consensus emerging demanding developers to assume more responsibility for security as more organizations embrace best DevSecOps practices...
Why Proactive Security Matters with Threat Modeling

Why Proactive Security Matters (And How We’re More Reactive Than We Think)

With the threat of massive cybersecurity incidents looming large, it’s easy to overestimate the capabilities of today’s hackers. The movies paint a...
ThreatModeler Helps Developers to Build Secure Code with Free, Lite Version of its Commercial Platform

ThreatModeler Launches Free, Lite Community Edition

As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading...
Top 7 cybersecurity podcasts

7 Cybersecurity Podcasts You Should Listen to Now

Technology continues to evolve at lightning speed, and hackers are working as fast as they can to manifest the latest cybersecurity threat. In this...
ThreatModeler blog post on cloud threats

5 Cloud Attack Techniques to Know Now

According to market research firm Gartner, public cloud computing services will grow to a $266.4 billion industry in 2020. This number represents a...
Zoom faces mounting scrutiny on security issues, which it is resolving.

As the Nation Turns to Zoom for Video-Teleconferencing, Security Issues Surface

Practically overnight, the nation’s populace went from normal, everyday routine to remote work to address the coronavirus pandemic. To stay in touch...