Why Every Business Needs to Threat Model Like a Bank

Why Every Business Needs to Threat Model Like a Bank

Banks are the original threat modelers. Going back to the days when they hired the Pinkerton Agency to protect their valuables being transported by stagecoach, banks have always tried to stay one step ahead of their adversaries. Of course, when it comes to protecting...
Common Vacation Scams and How to Avoid Them

Common Vacation Scams and How to Avoid Them

Fraudsters take advantage of people who use public Wifi while traveling and steal their financial information Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us here.
Cheers ransomware hits VMware ESXi systems

Cheers ransomware hits VMware ESXi systems

Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months. Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us...
DoJ Decision Gives Good Faith Hackers Relief From CFAA

DoJ Decision Gives Good Faith Hackers Relief From CFAA

After years of being hamstrung by the threat of prosecution under The Computer Fraud and Abuse Act (CFAA), security researchers and hackers operating in good faith have gotten some relief after the U.S. Justice Department said it would not bring charges against them...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >