Pen Testing Evolves for the DevSecOps World

Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design. Read More: https://www.darkreading.com/dr-tech/pentesting-evolves-for-the-devsecops-world...
Threat Modeling: It’s not Just for IT Anymore

Threat Modeling: It’s not Just for IT Anymore

There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true anymore. Today, it seems like everything is connected to IT networks, including most devices which are part of an...
How Threat Modeling is Being Reinvented Today

How Threat Modeling is Being Reinvented Today

Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you can trace it back to the 70s, 80s or 90s. Regardless of the particular starting point, one thing is for sure. From that...
DevSecOps and the Evolution of Threat Modeling

DevSecOps and the Evolution of Threat Modeling

Threat modeling has become an integral part of the software development process, providing developers with an opportunity to identify security threats and vulnerabilities and create logical remediation methods. Read the full article here If you’d like to learn more...