Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Differentiating Compliance and Security for AWS Development
How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key...
DevSecOps Is Best When Applied in Layers
By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an...
Build Threat Models for Least-Privilege at Scale with ThreatModeler and AWS
The premise behind least privilege is simple: if you want to protect your bank vault, start by being very careful about who gets a key. In the...
Addressing the DevSecOps Dysfunction In Your Cloud
There is a consensus emerging demanding developers to assume more responsibility for security as more organizations embrace best DevSecOps practices...
Why Proactive Security Matters (And How We’re More Reactive Than We Think)
With the threat of massive cybersecurity incidents looming large, it’s easy to overestimate the capabilities of today’s hackers. The movies paint a...
ThreatModeler Launches Free, Lite Community Edition
As organizations struggle to maintain support of security initiatives during uncertain times, ThreatModeler is contributing its industry leading...
7 Cybersecurity Podcasts You Should Listen to Now
Technology continues to evolve at lightning speed, and hackers are working as fast as they can to manifest the latest cybersecurity threat. In this...
5 Cloud Attack Techniques to Know Now
According to market research firm Gartner, public cloud computing services will grow to a $266.4 billion industry in 2020. This number represents a...
As the Nation Turns to Zoom for Video-Teleconferencing, Security Issues Surface
Practically overnight, the nation’s populace went from normal, everyday routine to remote work to address the coronavirus pandemic. To stay in touch...