ThreatModeler Announces Version 6.0

ThreatModeler Announces Version 6.0

ThreatModeler announced the release of ThreatModeler 6.0, a platform update bringing several new capabilities to bolster and streamline the threat modeling process for security and DevOps teams. ThreatModeler 6.0 represents a complete redesign of the platform’s...

Pen Testing Evolves for the DevSecOps World

Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design. Read More: https://www.darkreading.com/dr-tech/pentesting-evolves-for-the-devsecops-world...
Threat Modeling: It’s not Just for IT Anymore

Threat Modeling: It’s not Just for IT Anymore

There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true anymore. Today, it seems like everything is connected to IT networks, including most devices which are part of an...
How Threat Modeling is Being Reinvented Today

How Threat Modeling is Being Reinvented Today

Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you can trace it back to the 70s, 80s or 90s. Regardless of the particular starting point, one thing is for sure. From that...
Cybersecurity Demand is Driving Upskilling Among Technologists

DevSecOps Engineer: An Emerging Cybersecurity Career Path

With more and more organizations relying on cloud-based tools to fuel their digital transformation projects and drive future growth, quickly developing and deploying applications has never been more important. At the same time, securing code against vulnerabilities...
DevSecOps and the Evolution of Threat Modeling

DevSecOps and the Evolution of Threat Modeling

Threat modeling has become an integral part of the software development process, providing developers with an opportunity to identify security threats and vulnerabilities and create logical remediation methods. Read the full article here If you’d like to learn more...