Five Things to Look for in a Threat Modeling Tool

Five Things to Look for in a Threat Modeling Tool

Organizations are starting to warm up to the idea that they need to implement threat modeling. After all, it’s not just good business, but in many cases, it’s mandatory. For example, there are now many regulatory bodies that mandate threat modeling. These include in...
Threat Modeling for Telecom Companies

Threat Modeling for Telecom Companies

In many ways, telecom companies are no different than other companies when it comes to cybersecurity. They’re potential targets because they handle sensitive and valuable data. However, telecom companies are in a class by themselves when it comes to defending...
What to do When it’s Too Late to Shift Left Security?

What to do When it’s Too Late to Shift Left Security?

There seems to be a general agreement that when it comes to implementing security in the software development lifecycle (SDLC), the sooner you do it the better. After all, the speed of software releases, the use of cloud-based services, the incorporation of automation...
The Two Features You Must Have in Your Threat Modeling Tool

The Two Features You Must Have in Your Threat Modeling Tool

More and more, companies are recognizing the importance of threat modeling. With all the cyber threats, and the increase in regulatory requirements, a formal threat modeling process is a must have for many companies today. Once an organization gets onboard with threat...
ThreatModeler Introduces CloudModeler Simulations

ThreatModeler Introduces CloudModeler Simulations

ThreatModeler, a leader in threat modeling and securing cloud infrastructure from design to deployment, improves its platform for user collaboration and security with features that include CloudModeler simulations, automated threat modeling and authentication...