Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Threat Modeling for Manufacturers
Even with software supposedly eating the world, there are still plenty of companies that make physical things. These products may not be as sexy or...
Threat Modeling for Retail Organizations
[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Threat Modeling for Healthcare Organizations
[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Threat Modeling for Financial Organizations
[et_pb_text _builder_version="4.14.2" background_color="rgba(237,237,237,0.84)" background_size="initial" background_position="top_left"...
Cybersecurity Tool Bloat—Yeah it’s a Thing
Listen to any cybersecurity tool vendor and they’ll try to convince you of two things. You need their type of product for protection and theirs is the...
ThreatModeler Achieves 50% Customer Growth in FY2023 as it Increases Automated Attack Surface and Threat Discovery, Reducing Threat Modeling Friction in DevSecOps
Achievements Accelerate Substantial Momentum in Addressing Compounding Regulatory Mandates for Complex Multi-Cloud Environments JERSEY CITY, N.J...
A Quick Overview of When to Threat Model
It’s easy to think of threat modeling as something developers do during the DevOps process to ensure a safe application. And that’s certainly true. To...
RSA Conference 2023 product preview
Keeping an organization secure against cyber threats necessitates a combination of employee training, security processes and tools to bolster...
Threat Modeling is not the Same as Threat Mapping
There’s a belief in the security community that if you’re doing threat mapping, you don’t need to do threat modeling. The idea is that threat mapping...