Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

How to Deploy Docker containers using Amazon Elastic Container Services and ThreatModeler

Amazon Elastic Container Service: How to Deploy a Docker Container in 5 Easy Steps

Amazon Elastic Container Service (Amazon ECS) consists of a decidedly accessible container management service that enables Docker containers to be...
ThreatModeler Holiday Cybersecurity Threats 2019

Holiday Cybersecurity Threats: ‘Tis the Season for Cyberattacks, You Need to Be Aware

The holidays come every year and so do heightened threats of a cyber attack during the shopping season. We are re-sharing this article so that you can...
ThreatModeler reporting on recent data breaches with Macy's and T-Mobile

Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a...
Drone Threat Models Reveal Cybersecurity Threats

Create a Drone Threat Model to Understand the Impact of a Data Breach

From the hobbyist looking for exciting recreation, to air force commanders coordinating military campaigns, Unmanned Arial Vehicles (UAV) – otherwise...
Data integrity through ThreatModeling

Importance of Data Integrity and Best Practices

Data integrity is best defined as the accuracy, consistency and reliability of data in transit and at rest. Quality data adheres to a number of...
In depth look at threat modeling and the ThreatModeler platform

An In Depth Look at ThreatModeling: What Programmers Need to Know

Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin...
Geolocation data breach

The Collateral Damage of a Geolocation Information Breach

In our last article in the ThreatModeler series about collateral damage of various types of data breaches, we examined the potential damage that could...
ThreatModeler will host a sponsored booth at AWS reInvent

ThreatModeler at AWS re:Invent 2019 in Las Vegas

For the second year in a row, ThreatModeler will host a sponsored booth at the AWS re:Invent conference in Las Vegas. In an endeavor to build...
ThreatModeling for API Security

Threat Modeling and Other Top Tips for Secure API

Application Programming Interfaces (APIs) contribute to a substantial amount of modern software application development. APIs are multidisciplinary...