Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Collateral Damage Fallout Data Breach

Collateral Damage Fallout from Experian Security Breach

Two out of the big three US credit bureaus, Experian and Equifax, have experienced a significant breach of consumer data in the last two years. On...
ThreatModeler JIRA plugin

Introducing the ThreatModeler JIRA Plugin

DevSecOps is all about pushing security left with tools that automate the integration between security and DevOps teams working in an agile...
Threat modeling tool Microsoft TMT

Realistic Threat Modeling: ThreatModeler vs. Microsoft TMT

In our previous articles comparing ThreatModeler™ and Microsoft Threat Modeling Tool (Microsoft TMT), we considered the tools from an AppSec...
data discovery for GDPR compliance

Data Discovery for GDPR Compliance

Come May 25, 2018 companies doing business with persons living in the European Union must demonstrate compliance with the new General Data Protection...
outputs beyond AppSec

Outputs Beyond AppSec: ThreatModeler vs. Threat Modeling Tool

Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases where...
analyze endpoint security

Analyze Endpoint Security

The need to analyze endpoint security is becoming increasingly important for organizations. Layered network security defenses are difficult to...
CISO Outputs quantify risk threat modeling Outputs Needed

Getting the Threat Modeling Outputs Needed

Many security professionals are die-hard Microsoft Threat Modeling Tool (TMT) fans. After all, it is free, and there are no limits from Microsoft on...
IoT Cybersecurity

Shadow IT and IoT Cybersecurity

White House Cybersecurity Coordinator Rob Joyce says IoT cybersecurity is a significant issue partially caused by a lack of accountable responsibility...
Threat Modeling is for Everyone

Threat Modeling is for Everyone

Threat modeling – in its simplest form – is about looking at a system or situation from an adversary’s perspective. From that unique perspective it is...