Sep 13, 2022 | Press Release, Recent News
Modern software development involves selecting and integrating tens or hundreds of complex components, services and infrastructure to deliver systems at the speed of business demands. Each integrated component may possess a hidden security design flaw or be developed...
Sep 8, 2022 | Press Release, Recent News
Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design. Read More: https://www.darkreading.com/dr-tech/pentesting-evolves-for-the-devsecops-world...
Sep 7, 2022 | Press Release, Recent News
Despite concerns from some quarters about tech layoffs and a possible recession, hiring cybersecurity workers remains a top priority for many organizations as infrastructure and network threats remain a constant cause of concern. Read More:...
Sep 6, 2022 | Recent News
There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true anymore. Today, it seems like everything is connected to IT networks, including most devices which are part of an...
Aug 30, 2022 | Threat Modeling Process
Cyber burnout is a real thing. What it is? What exactly is cyber burnout or cyber fatigue? According to Stacy Thayer, speaking at blackhat 2022, “Occupational burnout is clinically defined as a psychological syndrome that occurs due to chronic emotional interpersonal...
Aug 23, 2022 | Threat Modeling Process
Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you can trace it back to the 70s, 80s or 90s. Regardless of the particular starting point, one thing is for sure. From that...
Aug 22, 2022 | Press Release, Recent News
With more and more organizations relying on cloud-based tools to fuel their digital transformation projects and drive future growth, quickly developing and deploying applications has never been more important. At the same time, securing code against vulnerabilities...
Aug 15, 2022 | Press Release, Recent News
Threat modeling has become an integral part of the software development process, providing developers with an opportunity to identify security threats and vulnerabilities and create logical remediation methods. Read the full article here If you’d like to learn more...
Aug 10, 2022 | Security, Threat Modeling, Threat Modeling Software, ThreatModeler
There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand the difference requires an analogy. Imagine threat modeling as bodybuilding. Building a threat model would be your...
Aug 10, 2022 | Press Release, Recent News
Security has long been treated as an afterthought in software development. Developers work to create effective code but only consider software security in the testing and deployment stages of the development lifecycle. With accelerating intellectual property theft,...