• About
    • Community
    • Intellectual Property
    • Awards
    • Events
    • Careers
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
    • Patents
  • Industries
    • Health
    • Finance
    • Retail
    • Cloud
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Cartoons
    • The Ultimate Guide to Threat Modeling
    • Marketplace
  • Live Demo
Select Page
SDLC vs. CDLC – Why More Organizations Are Turning to the Cloud

SDLC vs. CDLC – Why More Organizations Are Turning to the Cloud

by threatmodeler | Feb 12, 2020 | API Security, Cloud security, Cloud Threat Modeling, DevOps, Enterprise DevSecOps

Within computer systems engineering, software development lifecycle (SDLC) has been a solid way to create high quality software that meets user requirements. SDLC phases are designed to be agile, iterative and chronological, clearly defined in plan, design, build,...
The Collateral Damage of a Social Profile Data Breach

The Collateral Damage of a Social Profile Data Breach

by threatmodeler | Dec 16, 2019 | CISO, Cloud security, Cloud Threat Modeling, Security, Threat Models

The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach.  This article reviews the potential damages that can occur with a social profile...
How to Secure Your Amazon S3 File Storage Service

How to Secure Your Amazon S3 File Storage Service

by threatmodeler | Dec 5, 2019 | API Security, AWS, Cloud security, Cloud Threat Modeling, DevSecOps, Security

Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of content, e.g. HTML web pages or financial data records. Whatever you store in an S3 bucket is comprised of data. Even...
How Serverless Can Save on CI/CD Time and Cost

How Serverless Can Save on CI/CD Time and Cost

by threatmodeler | Oct 2, 2019 | Cloud security, Cloud Threat Modeling

Going serverless means departing from a traditional, on-premise server infrastructure, and migrating to third-party, cloud-hosted applications and services. Serverless is also known as backend as a service (BaaS). When an organization goes serverless, they take...
Enhanced Cloud Security Solutions Through Threat Modeling, SaaS, and More

Enhanced Cloud Security Solutions Through Threat Modeling, SaaS, and More

by threatmodeler | Sep 24, 2019 | Cloud security, Cloud Threat Modeling

The 21st century has seen many significant technological advancements in the cross-section of digitalization, cybersecurity, and cloud security.  As more valuable data is being stored and used to make data-driven decisions, its protection against internal misuse,...
Financial Services Moving to the Hybrid Cloud

Financial Services Moving to the Hybrid Cloud

by threatmodeler | Sep 18, 2019 | Cloud security, Cloud Threat Modeling, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling

Increasingly, the financial services industry is migrating to the cloud for their content storage needs. Cloud storage occurs in physical storage and can be stored in private, public or hybrid facilities. But before we get detail in the nuances and strategic...
« Older Entries
Next Entries »

Tags

2020 cybersecurity Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevOps Digest DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling Press Release proactive security Risk Management SC Magazine Security Boulevard security by design Security Magazine The Cyber Wire ThreatModeler Threat Modeling Threat Post VM Blog ZDNet

Latest Posts

  • Blog (39)
    The Best Cyber Insurance is Not What You Think
  • Blog (38)
    Why Threat Modeling? Why Now?
  • Blog (37)
    Can You Code Your Way to Cybersecurity?
  • Blog (36)
    One Good Way to Know if Developers are Developing Secure Code
  • Blog (35)
    The Seemingly Unsolvable Problem of Agile Development

About ThreatModeler

ThreatModeler delivers on the promise of one-click threat modeling. Our patented technology enables secure and compliant applications, infrastructure, and cloud assets in design, saving millions in incident response costs, remediation costs and regulatory fines. ThreatModeler’s SaaS platform automates the “Sec” in DevSecOps from design to code to cloud at scale.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Careers
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
Headquarters Address:

1 Evertrust Plaza Suite 802

Jersey City NJ 07302.

  • Twitter
  • YouTube
  • LinkedIn
  • Instagram
© 2023. All Rights Reserved.   Privacy Policy    |   Terms of Service

NEW! Cybersecurity asset marketplace offering free, pre-built threat models →