Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

risk analysis and mitigation presents decision makers with info to set security controls

Cut Risk Analysis Costs Through Automated Threat Modeling

Here at ThreatModeler HQ, we’ve had conversations with customers recently, each telling a similar story. Business owners are signing exceptions to...
Threat modeler mentioned as important to cybersecurity approach for private and public sectors

Government and Technology Sectors: Threat Modeling is Crucial to 2020 Election Security

Securing the 2020 US state, federal and presidential elections against cyberattacks became the topic of serious discussion for both the private and...
Cybersecurity - defend your organization against SQL Injections

How to Test for and Mitigate SQL Bugs

SQL injections are a malicious form of cyberattack in which hackers insert malicious code into database servers. SQL injections can take control of...
ThreatModeler Blog Post About Securing Against Password Attacks

Secure Your Organization from Dictionary and Brute Force Password Attacks

Cyberattackers that target passwords, also known as password cracking, is one of the most common techniques used in compromising secured data...
Threat Modeling an AWS Microservices Architecture

Threat Modeling For AWS: Building A Microservice Architecture

With the adoption of cloud data centers, organizations are now able to scale their applications at reasonable costs. Most cloud platform...
ThreatModeler hosted a sponsored vendor booth at BlackHat

ThreatModeler at BlackHat 2019 Cybersecurity Conference

Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security...
Threat modeling software SDLC

Secure DevOps Starts With Threat Modeling Software

Maintaining a secure DevOps environment is crucial for protecting the private, confidential data maintained by your organization. This rule of thumb...
ThreatModeler Explains Methodologies for Threat Modeling

Stride, VAST, Trike, & More: Which Threat Modeling Methodology is Right For Your Organization?

[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Threat Modeling with Process Flow Diagrams

Process Flow vs. Data Flow Diagrams for Threat Modeling

Threat modeling for IT system and application security entered the cybersecurity mainstream in the early 2000s. Initially, the discipline borrowed its...