Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

Blog (22)

Threat Modeling for Manufacturers

Even with software supposedly eating the world, there are still plenty of companies that make physical things. These products may not be as sexy or...
Blog (21)

Threat Modeling for Retail Organizations

[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Blog (20)

Threat Modeling for Healthcare Organizations

[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Blog (19)

Threat Modeling for Financial Organizations

[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Blog (18)

Cybersecurity Tool Bloat—Yeah it’s a Thing

Listen to any cybersecurity tool vendor and they’ll try to convince you of two things. You need their type of product for protection and theirs is the...
Threatmodeler logo

ThreatModeler Achieves 50% Customer Growth in FY2023 as it Increases Automated Attack Surface and Threat Discovery, Reducing Threat Modeling Friction in DevSecOps

Achievements Accelerate Substantial Momentum in Addressing Compounding Regulatory Mandates for Complex Multi-Cloud Environments JERSEY CITY, N.J...
Blog (17)

A Quick Overview of When to Threat Model

It’s easy to think of threat modeling as something developers do during the DevOps process to ensure a safe application. And that’s certainly true. To...
security logo

RSA Conference 2023 product preview

Keeping an organization secure against cyber threats necessitates a combination of employee training, security processes and tools to bolster...
Blog (16)

Threat Modeling is not the Same as Threat Mapping

There’s a belief in the security community that if you’re doing threat mapping, you don’t need to do threat modeling. The idea is that threat mapping...