• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
  • Live Demo
Select Page
5 Cloud Attack Techniques to Know Now

5 Cloud Attack Techniques to Know Now

by threatmodeler1 | Apr 9, 2020 | 5G Security, API Security, Attack Surface Analysis, AWS, CISO, Cloud security

According to market research firm Gartner, public cloud computing services will grow to a $266.4 billion industry in 2020. This number represents a 17% growth over the previous year. A research vice president at Gartner stated that, “At this point, cloud adoption is...
Introduction to Kubernetes Container Orchestration

Introduction to Kubernetes Container Orchestration

by threatmodeler1 | Feb 18, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Security

In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...
SDLC vs. CDLC – Why More Organizations Are Turning to the Cloud

SDLC vs. CDLC – Why More Organizations Are Turning to the Cloud

by threatmodeler1 | Feb 12, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Enterprise DevSecOps

Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user requirements. SDLC phases are designed to be agile, iterative and chronological, clearly defined in plan, design, build,...
Modernize Your SQL Server Environment with VMware Cloud on AWS

Modernize Your SQL Server Environment with VMware Cloud on AWS

by threatmodeler1 | Jan 2, 2020 | API Security, AWS, Cloud security, Threat Modeling

Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as monitoring and storage. VMware Cloud on AWS (Amazon Web Services) is committed to delivering steady software defined data...
How to Secure Your Amazon S3 File Storage Service

How to Secure Your Amazon S3 File Storage Service

by threatmodeler1 | Dec 5, 2019 | API Security, AWS, Cloud security, Cloud Threat Modeling, DevSecOps, Security

Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of content, e.g. HTML web pages or financial data records. Whatever you store in an S3 bucket is comprised of data. Even...
Threat Modeling and Other Top Tips for Secure API

Threat Modeling and Other Top Tips for Secure API

by threatmodeler1 | Nov 12, 2019 | API Security, Attack Surface Analysis

Application Programming Interfaces (APIs) contribute to a substantial amount of modern software application development. APIs are multidisciplinary, data driven and can be used for a number of applications, including microservices, web pages, mobile, the Internet of...

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer Press Release ransomware Risk Management SC Magazine SCM Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process Threat Post ZDNet

Latest Posts

  • Hackers Cast LinkedIn as Most-Popular Phishing Spot
  • Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling
  • SolarWinds Data Breach Lawsuit Takeaways for CISOs
  • Better Cybercrime Metrics Act Signed Into Law
  • 23 DevSecOps tools for baking security into the development process

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved. Design by Tethos Creative.   |   Privacy Policy    |   Terms of Service