A Quick Overview of When to Threat Model

A Quick Overview of When to Threat Model

It’s easy to think of threat modeling as something developers do during the DevOps process to ensure a safe application. And that’s certainly true. To that end, threat modeling is something you do when developing an application. But that’s not the only time you should...
RSA Conference 2023 product preview

RSA Conference 2023 product preview

Keeping an organization secure against cyber threats necessitates a combination of employee training, security processes and tools to bolster enterprise cybersecurity. From hybrid-cloud solutions to risk management tools, Security magazine highlights recent products...
Threat Modeling is not the Same as Threat Mapping

Threat Modeling is not the Same as Threat Mapping

There’s a belief in the security community that if you’re doing threat mapping, you don’t need to do threat modeling. The idea is that threat mapping is just as good as, or at least takes the place of, threat modeling. It’s true they are both a formalized way to...
Don’t Let Failing Banks Distract You from Cyber Threats

Don’t Let Failing Banks Distract You from Cyber Threats

Human beings and organizations suffer from a cognitive condition known as recency bias. Recency bias “is a cognitive bias that favors recent events over historic ones. It is the tendency to place too much emphasis on experiences that are freshest in your memory—even...