• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
  • Live Demo
Select Page
Accelerating Your Cloud Journey With Security Built In

Accelerating Your Cloud Journey With Security Built In

by threatmodeler1 | Oct 8, 2020 | Attack Surface Analysis, AWS, CISO, Cloud security, security controls

The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to secure brave new features such as containers, microservices and automatic scaling. Threat modeling, traditionally a manual...
Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

by threatmodeler1 | Aug 12, 2020 | AWS, Cloud security, Cloud Threat Modeling, Compensating Controls, Risk Management, Security

It’s no secret that Amazon Web Services (AWS) helps to run a wide swath of the web’s most popular websites, services, and applications. However, the rise of cloud services has not gone unnoticed by hackers, who have broadened their scope from traditional...
How to Automate and Accelerate the Design of Secure AWS Cloud Environments

How to Automate and Accelerate the Design of Secure AWS Cloud Environments

by threatmodeler1 | Jul 2, 2020 | Attack Surface Analysis, AWS, CISO, Cloud security, Developers

For this ThreatModeler Blog Special Edition, we recap our Fireside Chat (with link to the webcast) moderated By Ty Sbano, Chief Security & Trust Officer, Sisense; with panelists: Praveen Nallasamy, Vice President, Cybersecurity at BlackRock Tom Holodnik, Software...
How VPCs Work, and How to Integrate Them Into Identity Access Security

How VPCs Work, and How to Integrate Them Into Identity Access Security

by threatmodeler1 | Jun 23, 2020 | AWS, Cloud security, Cloud Threat Modeling, DevSecOps

While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public, less secure cousin. The reason is simple: it’s way cheaper. “Private” cloud infrastructure requires providers to assign...
Differentiating Compliance and Security for AWS Development

Differentiating Compliance and Security for AWS Development

by threatmodeler1 | Jun 4, 2020 | AWS, AWS Security Epics Automated, Cloud security, Security

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key differences. Both deal with organizational safety and security, minimize risk, protect consumer data, and experience...
DevSecOps Is Best When Applied in Layers

DevSecOps Is Best When Applied in Layers

by threatmodeler1 | Jun 2, 2020 | Attack Surface Analysis, AWS, AWS Security Epics Automated, CISO, DevOps, DevSecOps

By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an attack and so on. That same, tried and true, security in depth concept applies to DevOps as responsibility for...
« Older Entries

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer ransomware Risk Management SC Magazine SCM Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process threat modeling tool Threat Post ZDNet

Latest Posts

  • Increased Cyber Threats to Medical Devices Cause Healthcare Industry Self-Evaluation
  • When Forbes Says Threat Modeling is Critical You Know it’s Important
  • Understanding the Challenges of Securing Cloud Environments That Never Stop Changing
  • The Role That Threat Modeling Plays in the DevOps Security Process
  • Why Threat Modeling is Essential in Evaluating Policy-Driven Security

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved. Design by Tethos Creative.   |   Privacy Policy    |   Terms of Service