Hackers Cast LinkedIn as Most-Popular Phishing Spot

Hackers Cast LinkedIn as Most-Popular Phishing Spot

LinkedIn users are being steadily more targeted by phishing campaigns. In recent weeks network audits revealed that the social media platform for professionals was in the crosshairs of 52 percent of all phishing scams globally in the first quarter of 2022. This is the...
Hackers Cast LinkedIn as Most-Popular Phishing Spot

Hackers Cast LinkedIn as Most-Popular Phishing Spot

LinkedIn users are being steadily more targeted by phishing campaigns. In recent weeks network audits revealed that the social media platform for professionals was in the crosshairs of 52 percent of all phishing scams globally in the first quarter of 2022. Read the...
2022 SC Awards Finalists: Best Threat Intelligence Technology

2022 SC Awards Finalists: Innovator of the Year

Bad actors rapidly evolve their tactics. Security companies, therefore, need to evolve faster. And they need leaders to drive that effort. Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us...
SolarWinds Data Breach Lawsuit Takeaways for CISOs

SolarWinds Data Breach Lawsuit Takeaways for CISOs

A lawsuit alleges SolarWinds did not take adequate actions to prevent a data breach. Security executives offer insights into this complex case Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us...
SolarWinds Data Breach Lawsuit Takeaways for CISOs

Better Cybercrime Metrics Act Signed Into Law

U.S. President Joe Biden has signed the Better Cybercrime Metrics Act, aiming to improve how the federal government tracks, measures, analyzes and prosecutes cybercrime.  Endorsed by the National Fraternal Order of Police and several national law enforcement...
23 DevSecOps tools for baking security into the development process

23 DevSecOps tools for baking security into the development process

Because of DevOps’ agile, continuous, and fast nature, building in security is essential, but many organizations struggle to do so. While that struggle is often a cultural lack of organizational priority, or even a process challenge, good tools can help enterprises to...
Secure Online Banking

Secure Online Banking

Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >