CircleCI Rotates GitHub 0Auth Tokens After Security Incident

CircleCI Rotates GitHub 0Auth Tokens After Security Incident

Following a security incident, CircleCI has completed the process of rotating GitHub OAuth tokens for their customers. CircleCI said Saturday that while customers could still rotate their own tokens, it has “confidence in the security of the CircleCI platform, and...
Another Year—Another Reason to do Threat Modeling

Another Year—Another Reason to do Threat Modeling

It’s 2023 and the world of application development is slowly but surely migrating from DevOps to DevSecOps. As you probably know, DevSecOps “automates the integration of security at every phase of the software development lifecycle, from initial design through...
ThreatModeler Delivers Proactive Cyber Security Trend in Roundup

ThreatModeler Delivers Proactive Cyber Security Trend in Roundup

ThreatModeler Survey: IT Leaders Confident in Effectiveness of Tools, Though Many are Looking for More Proactive, Automated Solutions (News Direct) Research finds that enterprises that leverage threat modeling report more confidence in their security and development...
ThreatModeler: Year in Review

ThreatModeler: Year in Review

As 2022 comes to an end, we’ve definitely seen some major themes emerge with regard to threat modeling. In this year in review, we discuss some of the more important ones. The Ever Expanding Scope of Threat Modeling Perhaps the most recurrent theme in 2022 was the...
New cybersecurity technology 2022

New cybersecurity technology 2022

As the year ends, Security magazine spotlights cybersecurity solutions released in 2022. Covering everything from insider risk mitigation to improved threat monitoring, we spotlight innovative cybersecurity products and technology that can help enterprise security...
Beyond Ransomware: Cybercrime Trends to Watch in 2023

Beyond Ransomware: Cybercrime Trends to Watch in 2023

The global cybercrime problem continues to grow and change, bringing with it additional challenges for those tech and cybersecurity pros entrusted with securing their organizations’ data and infrastructure. Read more...
Three Reasons to Invest in a Threat Modeling Tool

Three Reasons to Invest in a Threat Modeling Tool

We’ve reached the point where security decision makers have come to embrace the idea of threat modeling. The notion of finding and eliminating cyber vulnerabilities before they become cyber incidents is a pretty easy idea to get behind. But just because decision...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >