


Three Must Have DevSecOps Threat Modeling Tools for 2022
If you’re intent on creating secure software, then eventually you’re going to have to evolve from DevOps to DevSecOps. But as InfoQ is quick to point out, “DevSecOps isn’t possible by going about normal day-to-day DevOps processes. You can’t tell team members to just...
Why Companies are Racing to Integrate Automated Threat Modeling into Their Workflows
Early in a technology’s evolution, the adoption can be rapid—maybe even exponential—and yet sill fly under the radar because the market is so small. And that’s where threat modeling is today. Threat modeling is not yet a category with a sizeable TAM (total addressable...
Threat Assessment vs Threat Modeling: What’s the Difference?
While there is actually a great deal of overlap between threat assessment and threat modeling in terms of their ultimate objective, they are different in terms of their scope. As NIST is quick to point out, “The assessment process is an information-gathering activity,...
A Cybersecurity Checklist for the New Year
When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In some ways, it really is that simple. And it applies to processes as well as technology. As an example, take a corporate...