Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Government and Technology Sectors: Threat Modeling is Crucial to 2020 Election Security
Securing the 2020 US state, federal and presidential elections against cyberattacks became the topic of serious discussion for both the private and...
How to Test for and Mitigate SQL Bugs
SQL injections are a malicious form of cyberattack in which hackers insert malicious code into database servers. SQL injections can take control of...
Secure Your Organization from Dictionary and Brute Force Password Attacks
Cyberattackers that target passwords, also known as password cracking, is one of the most common techniques used in compromising secured data...
Threat Modeling For AWS: Building A Microservice Architecture
With the adoption of cloud data centers, organizations are now able to scale their applications at reasonable costs. Most cloud platform...
ThreatModeler at BlackHat 2019 Cybersecurity Conference
Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security...
Secure DevOps Starts With Threat Modeling Software
Maintaining a secure DevOps environment is crucial for protecting the private, confidential data maintained by your organization. This rule of thumb...
Stride, VAST, Trike, & More: Which Threat Modeling Methodology is Right For Your Organization?
[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Process Flow vs. Data Flow Diagrams for Threat Modeling
Threat modeling for IT system and application security entered the cybersecurity mainstream in the early 2000s. Initially, the discipline borrowed its...
IoT Threat Modeling: An Example Highlighting the Importance of IoT Security
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that...