• About
  • Community
  • News
  • Careers
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
    • Patents
  • Industries
    • Health
    • Finance
    • Retail
    • Cloud
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
    • Intellectual Property
    • LP-Marketplace
  • Live Demo
Select Page
Why Medical Devices Need to be Secured Right From Design

Why Medical Devices Need to be Secured Right From Design

by threatmodeler | Jun 14, 2022 | Blog, IoT Cybersecurity, Threat Modeling

The healthcare industry is teaming up with electronic medical devices. And many of them are connected to the local area network in a medical facility, making them IoT (Internet-of-Things) devices. These IoT medical devices offer many benefits, including the ability to...
Increased Cyber Threats to Medical Devices Cause Healthcare Industry Self-Evaluation

Increased Cyber Threats to Medical Devices Cause Healthcare Industry Self-Evaluation

by threatmodeler | May 2, 2022 | Blog, Cyber Risk, IoT Cybersecurity, Regulatory Compliance, security controls

When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should.  The next great wave of...
Top 5 Tips for Health Care Cybersecurity

Top 5 Tips for Health Care Cybersecurity

by threatmodeler | Mar 18, 2020 | Cloud security, Cyber Risk, Enterprise Threat Modeling, IoT Cybersecurity, Regulatory Compliance, Security

The healthcare sector repeatedly battles a high number of data breaches and other cybersecurity issues. According to the 2019 Ponemon Institute-IBM Security report, healthcare corporations pay an estimate of $6.5 million per breach, which accounts for more than 65...
Cybersecurity Experts Say Organizations Must Prepare for 5G and IoT Threats

Cybersecurity Experts Say Organizations Must Prepare for 5G and IoT Threats

by threatmodeler | Mar 12, 2020 | 5G Security, Attack Surface Analysis, Cloud security, IoT Cybersecurity

With the pending dominance Internet of Things (IoT) adoption in business applications, combined with a growing necessity for mobile devices and laptops, the limitations of 4G LTE technology serves as a motivation for mobile network operators to launch enhanced 5G...
With the Right Threat Modeling Tool, You Can Save Millions of Dollars

With the Right Threat Modeling Tool, You Can Save Millions of Dollars

by threatmodeler | Feb 19, 2020 | Cloud security, IoT Cybersecurity, Risk Management, Security

Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed to hackers and malicious insiders daily. As ubiquitous as they are today, threats and vulnerabilities are only...
Cybersecurity Threats in the Hotel and Hospitality Industry

Cybersecurity Threats in the Hotel and Hospitality Industry

by threatmodeler | Feb 6, 2020 | Attack Surface Analysis, IoT Cybersecurity, Risk Management, Security

Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...
« Older Entries

Tags

2020 cybersecurity Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling Blog CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes IoT IoT Security one-click threat modeling PC Gamer Press Release proactive security ransomware Risk Management SC Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process Threat Post VM Blog ZDNet

Latest Posts

  • Blog (5)
    Are Your Threat Models Ready for Q-Day?
  • Blog (4)
    The Value of a Community Marketplace in Democratizing DevSecOps
  • Blog (3)
    Are Risk Assessment and Threat Modeling Really Two Different Things?
  • Blog
    Another Year—Another Reason to do Threat Modeling
  • Copy Of Untitled Design (2)
    ThreatModeler: Year in Review

About ThreatModeler

ThreatModeler® is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Careers
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
Headquarters Address:

1 Evertrust Plaza Suite 802

Jersey City NJ 07302.

  • Twitter
  • YouTube
  • LinkedIn
  • Instagram
© 2023. All Rights Reserved.   Privacy Policy    |   Terms of Service

NEW! Cybersecurity asset marketplace offering free, pre-built threat models →