Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Cybersecurity Bounty Bug Hunters

ThreatModeler at DHS Annual Cybersecurity Summit – Bug Bounty Hunters Discussed

On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit...

Enhanced Cloud Security Solutions Through Threat Modeling, SaaS, and More

The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security.  As...
Cloud Security Cloud Threat Modeling

Enhanced Cloud Security Solutions Through Threat Modeling, SaaS, and More

The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security.  As...
RASP Defense Can Work Together with Threat Modeling to Identify Attack Vectors

How Runtime Application Self-Protection Adds an Integrated Layer of Threat Defense

In Runtime application self-protection (RASP) emerged in recent years as a way to address application vulnerability issues and to add an extra layer...
ThreatModeler helps attack surface analysis to identify ransomware threats.

How Threat Modeling Can Prevent Your Next Ransomware Attack

The recent ransomware attacks on Texas and Louisiana schools shed some light on how vulnerable government is to cyber threats. At the 2nd Annual...
Financial Industry Migrating to the Cloud for Data Storage

Financial Services Moving to the Hybrid Cloud

Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and...
Differences between threat, vulnerabilities and risks explain

Differences Explained: Threat vs. Vulnerability vs. Risk

Threat, vulnerability and risk are terms that are inherent to cybersecurity. But oftentimes, organizations get their meanings confused. It is crucial...
Learn about how and why AWS created the Well-Architected Framework

What an AWS Well-Architected Framework Should Look Like

For organizations looking to improve on operational efficiencies, more and more CIOs are migrating to the cloud. Amazon Web Services (AWS) is one of...
IoT UART Security

Our Guide to IoT UART Security Protocols

A universal asynchronous receiver/transmitter (UART) is a hardware device with circuitry that facilitates communication between parallel and serial...