


The Top 3 Questions to Ask a Threat Modeling Vendor
Purchasing a threat modeling tool can be intimidating. For starters, most people who need threat modeling aren’t threat modeling experts. To compound matters, there are even fewer people who keep up on threat modeling capabilities. What may have been considered...
Secure Online Banking
Financial institutions are consistently in the top-five list of cyber attack targets, with the greatest increase in data breach risk coming from outside hackers.[1] Customer financial records and associated personally identifying information are high-value commodities...
DevSecOps & Automated Threat Modeling for Federal Agencies
ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the labor intensive manual process of threat modeling. Those charged with proactively managing NIST 800-53 Rev. 5...
Advantages of Modular Threat Modeling
Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages these to great advantage in reusing these patterns in threat modeling. Be it either components or templates of groups...