Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Process Flow vs. Data Flow Diagrams for Threat Modeling
Threat modeling for IT system and application security entered the cybersecurity mainstream in the early 2000s. Initially, the discipline borrowed its...
IoT Threat Modeling: An Example Highlighting the Importance of IoT Security
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that...
ThreatModeler Talks Security at RSA Conference 2019
RSA Conference 2019 has come and gone successfully in the city of San Francisco. Last week, hundreds of companies were gathered in what is known as...
Threat Modeling for AWS: Webinar Announcing ThreatModeler Cloud Edition
As organizations move to the cloud, they recognize security as a requirement to protect their data. Amazon is known as a leading player in the cloud...
The Must-Attend Cybersecurity Conferences in 2019
Conferences are important vehicles allowing professionals to gain valuable insights from leading experts in a specific industry. The fast-growing...
Top 5 Threats of Moving to the Cloud
Organizations continue to adopt cloud-based services without becoming fully aware of the risks of cloud migration. There are many challenges to...
Threat Model of the Month – January 2019
AWS Microservices Architecture Description: Microservices architecture is a method of developing software applications as a suite of independently...
What to expect in Cybersecurity in 2019
A new year comes with new challenges. It is a time of deliberation and preparation for organizations across all industries and divisions. One of the...
ThreatModeler Software Inc. joins Cybersecurity Tech Accord
We are proud to announce that ThreatModeler Software Inc has officially joined the Cybersecurity Tech Accord to promote a safe online world and...