Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

ThreatModeler at RSA Event recap

ThreatModeler at RSA Conference 2020 Recap

We came, we saw, we talked threat models. ThreatModeler Software, Inc. hosted a sponsored booth at the RSA Conference held in San Francisco. Great...
Information Security for GDPR Compliance

Information Security and Cybersecurity Tips for GDPR Compliance

The EU General Data Protection Regulation (GDPR) is the European Union’s upgrade of the current Data Protection Direction. The GDPR is one of the most...
Educating K-12 and higher education on threat modeling to meet the demands of the cybersecurity field

Why Cybersecurity Must Be a Priority in Education at All Levels

Technology is all around us. From our homes, schools, businesses – even in transit. We rely on technology to ensure, for example that critical...
stalkerware and cyberstalking

Stalkerware Is a Dangerous Threat and Not a Lot Is Being Done About It

Stalkerware is one of the most invasive forms of cybercrime and involves the use of spyware that is freely available on the market. Once installed on...
Coronavirus phishing scams and Google Ads ransomware extortion

Be On the Lookout for Coronavirus Phishing and Google Ads Ransomware Cyberattacks

Hackers Are Using Phishing Tactics to Feed on Coronavirus Fears The recent coronavirus outbreak has triggered a global state of panic. Not only in the...
Save On Data Breach Costs

With the Right Threat Modeling Tool, You Can Save Millions of Dollars

Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed...
ThreatModeler for Kubernetes

Introduction to Kubernetes Container Orchestration

In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes...
Top 5 Password Attack Types and How to Prevent Them Copy Of Copy Of Untitled 4

Top 5 Password Attack Types and How to Prevent Them

Password security is no joke. It’s a security measure for the point of entry to personally identifiable information (PII), and confidential, sensitive...
CDLC overview with threat modeling

SDLC vs. CDLC – Why More Organizations Are Turning to the Cloud

Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user...