Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Collateral Damage Fallout from Experian Security Breach
Two out of the big three US credit bureaus, Experian and Equifax, have experienced a significant breach of consumer data in the last two years. On...
Introducing the ThreatModeler JIRA Plugin
DevSecOps is all about pushing security left with tools that automate the integration between security and DevOps teams working in an agile...
Realistic Threat Modeling: ThreatModeler vs. Microsoft TMT
In our previous articles comparing ThreatModeler™ and Microsoft Threat Modeling Tool (Microsoft TMT), we considered the tools from an AppSec...
Data Discovery for GDPR Compliance
Come May 25, 2018 companies doing business with persons living in the European Union must demonstrate compliance with the new General Data Protection...
Outputs Beyond AppSec: ThreatModeler vs. Threat Modeling Tool
Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases where...
Analyze Endpoint Security
The need to analyze endpoint security is becoming increasingly important for organizations. Layered network security defenses are difficult to...
Getting the Threat Modeling Outputs Needed
Many security professionals are die-hard Microsoft Threat Modeling Tool (TMT) fans. After all, it is free, and there are no limits from Microsoft on...
Shadow IT and IoT Cybersecurity
White House Cybersecurity Coordinator Rob Joyce says IoT cybersecurity is a significant issue partially caused by a lack of accountable responsibility...
Threat Modeling is for Everyone
Threat modeling – in its simplest form – is about looking at a system or situation from an adversary’s perspective. From that unique perspective it is...