Aug 3, 2022 | Press Release, Recent News
Researchers on Tuesday found a new type of crypto-mining attack in the wild that’s designed to hijack network bandwidth. Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us here.
Aug 2, 2022 | Cyber Risk, DevOps, Threat Modeling, Threat Modeling as a Service, Threat Modeling Process
Nobody thinks modeling threats is a bad idea. And yet threat modeling isn’t broadly adopted in the development community yet. Why is that? According to Izar Tarandach and Matthew J. Coles in their book Threat Modeling, it’s because “convincing stakeholders that threat...
Jul 26, 2022 | DevSecOps, Threat Modeling
Like everything else in the world of cybersecurity, threat modeling tools and practices continue to evolve. How is threat modeling evolving? There are five areas where we will continue to see improvement in the future. These are 1) collaboration; 2) ease of use; 3)...
Jul 19, 2022 | DevOps, DevSecOps, Threat Modeling
If you’re intent on creating secure software, then eventually you’re going to have to evolve from DevOps to DevSecOps. But as InfoQ is quick to point out, “DevSecOps isn’t possible by going about normal day-to-day DevOps processes. You can’t tell team members to just...
Jul 13, 2022 | Developers, Insider Threats, Threat Modeling
The old saying, an ounce of prevention is worth a pound of cure, certainly applies to software development. To leverage this benefit, the software industry has embraced the idea of “shifting left”. This is in reference to the linear (aka waterfall) method of software...
Jul 13, 2022 | Press Release, Recent News
For years, security-conscious organizations invested in Red teams and Blue teams to help shore up their cyber defenses. While Red teamers focused on mimicking attackers to target infrastructure and networks during security exercises, Blue teamers worked to stop those...
Jul 6, 2022 | Threat Model of The Month, Threat Modeling, Threat Modeling Process
As threat modeling continues to gain in popularity as an essential cybersecurity process, it may be tempting for newcomers to dive right in, purchase some technology and get going. But that would be putting the cart before the horse. Because threat modeling doesn’t...
Jul 6, 2022 | Press Release, Recent News
In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no longer a viable approach. DevSecOps and the importance of threat modeling [Q&A] If you’d like...
Jun 28, 2022 | Press Release, Recent News
As criminal activity on the internet continues to accelerate, bug hunting for cash has begun to attract more and more security researchers. Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us...