Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

ThreatModeler article on cyber threats to financial services

Threat Modeling for Financial Services Security

In the recent US Securities and Exchange Commission report Cybersecurity and Resiliency Observations, the Office of Compliance Inspections and...
ThreatModeler blog on healthcare cybersecurity forecast

Healthcare Cybersecurity Forecast for 2020

Thanks to the Internet of Things (IoT) tech, medical devices are increasingly capable of delivering innovative patient care, with monitoring and...
ThreatModeler for SMB

Threat Modeling Important for Small-and-Midsize Business

According to a 2019 study on the financial impacts of data breaches, small-to-midsize businesses (SMBs) are “acutely” affected, averaging $2.5 million...
Elections and Voting Cybersecurity NY and CISA Collaborate

CISA Meets NY Elections Officials to Address Security

As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate...
A digest of some notable data breaches and public announcements about cybersecurity vulnerabilities

In 2020, Cybersecurity Threats Show No Signs of Slowing Down

It's just the beginning of 2020 and there have been a number of data breaches to raise browse and concern over the state of cybersecurity for the New...
Examples of Threat Model diagram

Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible –...
NSA warns of a Windows 10 bug

NSA Discloses Details About a Windows Security Flaw

Microsoft has released a critical patch for Windows after the US National Security Agency (NSA) detected a dangerous bug in the operating system. This...
Threat Modeling Past, Present and Future

Application Threat Modeling: Guide for CISOs

Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by...
Threat Modeling for CDLC

Secure Your CDLC with Threat Modeling

Cloud computing is now one of the most pervasive technology trends in technology, as more companies migrate to cloud computing. The cloud continues to...