• About
    • Community
    • Intellectual Property
    • Awards
    • Events
    • Careers
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
    • Patents
  • Industries
    • Health
    • Finance
    • Retail
    • Cloud
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Cartoons
    • The Ultimate Guide to Threat Modeling
    • Marketplace
  • Live Demo
Select Page
Accelerating Your Cloud Journey With Security Built In

Accelerating Your Cloud Journey With Security Built In

by threatmodeler | Oct 8, 2020 | Attack Surface Analysis, AWS, CISO, Cloud security, security controls

The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to secure brave new features such as containers, microservices and automatic scaling. Threat modeling, traditionally a manual...
Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

Behind the AWS Shared Responsibility Model and Today’s Cloud Threats

by threatmodeler | Aug 12, 2020 | AWS, Cloud security, Cloud Threat Modeling, Compensating Controls, Risk Management, Security

It’s no secret that Amazon Web Services (AWS) helps to run a wide swath of the web’s most popular websites, services, and applications. However, the rise of cloud services has not gone unnoticed by hackers, who have broadened their scope from traditional...
How to Automate and Accelerate the Design of Secure AWS Cloud Environments

How to Automate and Accelerate the Design of Secure AWS Cloud Environments

by threatmodeler | Jul 2, 2020 | Attack Surface Analysis, AWS, CISO, Cloud security, Developers

For this ThreatModeler Blog Special Edition, we recap our Fireside Chat (with link to the webcast) moderated By Ty Sbano, Chief Security & Trust Officer, Sisense; with panelists: Praveen Nallasamy, Vice President, Cybersecurity at BlackRock Tom Holodnik, Software...
How VPCs Work, and How to Integrate Them Into Identity Access Security

How VPCs Work, and How to Integrate Them Into Identity Access Security

by threatmodeler | Jun 23, 2020 | AWS, Cloud security, Cloud Threat Modeling, DevSecOps

While much of the tech world is adopting the private cloud for the added security and scalability, today’s developers typically rely on its public, less secure cousin. The reason is simple: it’s way cheaper. “Private” cloud infrastructure requires providers to assign...
Differentiating Compliance and Security for AWS Development

Differentiating Compliance and Security for AWS Development

by threatmodeler | Jun 4, 2020 | AWS, AWS Security Epics Automated, Cloud security, Security

How Security and Compliance Teams Can Collaborate and Thrive in the Cloud Compliance and security share a great deal in common, but there are key differences. Both deal with organizational safety and security, minimize risk, protect consumer data, and experience...
DevSecOps Is Best When Applied in Layers

DevSecOps Is Best When Applied in Layers

by threatmodeler | Jun 2, 2020 | Attack Surface Analysis, AWS, AWS Security Epics Automated, CISO, DevOps, DevSecOps

By Michael Vizard The best cybersecurity defense is always applied in layers. If one line of defense fails, the next should be able to thwart an attack and so on. That same, tried and true, security in depth concept applies to DevOps as responsibility for...
« Older Entries

Tags

2020 cybersecurity Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevOps Digest DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling Press Release proactive security Risk Management SC Magazine Security Boulevard security by design Security Magazine The Cyber Wire ThreatModeler Threat Modeling Threat Post VM Blog ZDNet

Latest Posts

  • Blog (39)
    The Best Cyber Insurance is Not What You Think
  • Blog (38)
    Why Threat Modeling? Why Now?
  • Blog (37)
    Can You Code Your Way to Cybersecurity?
  • Blog (36)
    One Good Way to Know if Developers are Developing Secure Code
  • Blog (35)
    The Seemingly Unsolvable Problem of Agile Development

About ThreatModeler

ThreatModeler delivers on the promise of one-click threat modeling. Our patented technology enables secure and compliant applications, infrastructure, and cloud assets in design, saving millions in incident response costs, remediation costs and regulatory fines. ThreatModeler’s SaaS platform automates the “Sec” in DevSecOps from design to code to cloud at scale.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Careers
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
Headquarters Address:

1 Evertrust Plaza Suite 802

Jersey City NJ 07302.

  • Twitter
  • YouTube
  • LinkedIn
  • Instagram
© 2023. All Rights Reserved.   Privacy Policy    |   Terms of Service

NEW! Cybersecurity asset marketplace offering free, pre-built threat models →