Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

ThreatModeler Online Activities

Collateral Damage of an Online Activities Data Breach

In our previous article on data breaches, we considered the potential damage that could result from public exposure of an individual’s membership...
ThreatModeler Top Five tips for workplace security

Top Five Ways to Secure Your Workplace Environment From Cybercrime

With cybercrime at an all-time high, achieving an adequate cybersecurity posture within the workplace is as important as ever. Cybersecurity comprises...
IoT UART Security

Securing IoT Requires a Big-Picture View With Threat Modeling

Over the course of recent years, Internet of Things (IoT)-embedded technology has become more pervasive. IoT is finding its way into all of the major...
Collateral damage of a data breach involving online communities

Collateral Damage of an Online Membership Data Breach

Previously we highlighted the potential harm to individuals that could result from a data breach involving Social Security numbers. Now, let’s...
Threat Model Process Flow Diagram

How to Process Flow Diagram for Threat Modeling

Process follow diagrams, also known as process flow charts, help organizations to map out business processes. Process flow diagrams are visual tools...
ThreatModeler blog post on social security numbers and a data breach

Collateral Damage of a Social Security Number Breach

In the previous article in this series on the collateral damage resulting from a data breach, we looked at the wide ranging damage that can be done...
ThreatModeler Security Objectives for Risk Management

Information Security Objectives: 8 Tips for CISOs

[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Pentesting Cybersecurity

How Much Will a Cybersecurity Penetration Test Cost?

Here at ThreatModeler, we believe that everyone – from personal consumers to workers within business functions at an organization – are consumers of...
Collateral Damage of PII

The Collateral Damage of a Personally Identifiable Information Data Breach

In the previous article in this series on the collateral damage produced by a data breach, we looked at the harm that could result if hackers gained...