Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

threat modeling for secure ICS

Threat Modeling for Critical Industrial Control Systems

Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control...
What to do pre-threat modeling

5 Things to Do Before You Threat Model

Threat modeling is vital for businesses trying to become proactive and deliberate in SDLC and CDLC with adequate application security. Security teams...
AWS Lambda and ThreatModeler for Security

AWS Lambda Features and Security

As technology advances, so does cybercrime. Hackers find increasingly sophisticated ways to compromise IT systems and applications. Organizations are...
Three Pillars of Cybersecurity by ThreatModeler

Three Pillars of a Scalable Threat Modeling Practice

When threat modeling methodologies first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel...
Top Data Breaches of 2020

Biggest Data Breaches of 2019

Data has become one of the most treasured resources in the world. Businesses that rely on cybernetic technology driven by data are perhaps the most...
ThreatModeler article on VMware Cloud on AWS

Modernize Your SQL Server Environment with VMware Cloud on AWS

Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as...
ThreatModeler Digest on the Top Data Breaches

Biggest Data Breaches Over the Past Decade

Over the past decade, our world has experienced horrific data breaches, a massive number of hackers, lots of nation-wide cyber-undercover activities...
ThreatModeler Collateral Damage of Privileged Information blog post

The Collateral Damage of a Privileged Information Data Breach

We’ve been looking at the damage that may result to individuals whose information is stolen when corporate or government databases are breached. Our...
ThreatModeler and 5G cyberscurity

Threat Modeling for 5G Cybersecurity

5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens...