Apr 11, 2022 | Recent News
There’s little disagreement that security should be baked into every step of the DevOps lifecycle. In fact, there’s even a name for it: DevSecOps. So, why isn’t its adoption more widespread? Well, as things turn out, there are quite a few challenges to DevOps...
Apr 5, 2022 | Press Release, Recent News
When companies and organizations shifted to remote work arrangements in response to the Covid-19 pandemic, leadership teams may have viewed it as a temporary situation. “Tech plans” in the beginning may have simply consisted of noting which employees had taken home a...
Apr 4, 2022 | Recent News
Policy-driven security makes perfect sense. You’re developing a secure system and you have some compliance requirements it must meet. You start by translating those requirements into a series of security policies with which your system must comply. You then cut loose...
Mar 30, 2022 | Press Release, Recent News
Cyber aggression accusations in hybrid war. Spam texts from your own number. Aviation DDoS incidents. ICS security advisories. Read the full article here If you’d like to learn more about ThreatModeler’s capabilities, you can contact us here.
Mar 29, 2022 | Press Release
The Certification Institute for Research Quality (CIRQ), an International Standards Organization (ISO) audit and certification body that is a subsidiary of the Insights Association, has awarded certification to ThreatModeler Software for compliance to ISO 27001, one...
Mar 28, 2022 | Recent News
Infrastructure as Code (IaC) sure is convenient. IaC is a way for DevOps teams to deploy and manage application environments through a model, rather than having to do it manually. And there sure are lots of benefits to deploying infrastructure that way. Benefits...
Mar 21, 2022 | Recent News
It seems that just about every application resides in the cloud today. There’s little doubt that these cloud infrastructures need cloud security. But cloud infrastructures are dynamic—they change continuously. So, how do you protect something that’s constantly...
Mar 14, 2022 | Recent News
As threat modeling becomes an integral part of application development, it is interesting to take a look back on its evolution. Here we see that its development represents a continuum from do-it-yourself to one-click threat modeling (almost). Microsoft STRIDE...
Mar 8, 2022 | Recent News
As we detailed in our last post, cars are essentially computers on wheels. And there will soon be a lot of these connected vehicles. According to Juniper Research, by 2025 there will be 206 million automobiles with embedded connectivity, 30 million of which will be...
Feb 28, 2022 | Recent News
We’ve heard someone refer to a Tesla as an iPhone on wheels, and that’s not too far off. Computer chips have been in automobiles for decades—that’ not new. What is new is that automobiles are now connected to the cloud. Just another node on the internet-of-things...