• About
  • News
  • Contact
  • Support
  • Login
ThreatModeler
  • Products
    • Threatmodeler
    • CloudModeler
    • IaC-Assist
  • Industries
    • Health
    • Finance
    • Retail
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Datasheets
    • Videos
    • Awards
    • Events
    • Cartoons
  • Live Demo
Select Page
DevSecOps & Automated Threat Modeling for Federal Agencies

DevSecOps & Automated Threat Modeling for Federal Agencies

by threatmodeler1 | May 27, 2021 | CISO, Cloud security, Enterprise Threat Modeling, Recent News, Threat Modeling Process, Uncategorized

ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the labor intensive manual process of threat modeling. Those charged with proactively managing NIST 800-53 Rev. 5...
Advantages of Modular Threat Modeling

Advantages of Modular Threat Modeling

by threatmodeler1 | Mar 24, 2021 | CISO, Cloud security, Enterprise Threat Modeling, Recent News, Threat Modeling Process, Uncategorized

Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages these to great advantage in reusing these patterns in threat modeling. Be it either components or templates of groups...
What Is One-Click Cloud Threat Modeling?

What Is One-Click Cloud Threat Modeling?

by threatmodeler1 | Feb 10, 2021 | CISO, Cloud security, Enterprise Threat Modeling, Recent News, Threat Modeling Process, Uncategorized

A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due to COVID, compared to 16.4% among companies that plan to move to the cloud in 2021.” In a fast changing world, those...
Six Steps to Threat Modeling for Secure Data Assets

Six Steps to Threat Modeling for Secure Data Assets

by threatmodeler1 | Jul 22, 2020 | Attack Surface Analysis, DevSecOps, Threat Modeling Process

For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building business value. If put into the wrong hands, compromised data assets may ruin client relationships, lead to even...
Threat Modeling: Are Data Flow Diagrams Enough?

Threat Modeling: Are Data Flow Diagrams Enough?

by threatmodeler1 | Jun 8, 2020 | AWS Security Epics Automated, Cyber Risk, Threat Modeling, Threat Modeling Process

By Stuart Winter-Tear, Director of Sales Engineering, ThreatModeler Software, Inc. As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled: “Security Threat Modeling: Are...
Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

Architecturally-Based Process Flow Diagrams: Examples and Tips to Follow

by threatmodeler1 | Jan 22, 2020 | Attack Surface Analysis, DevOps, Extended Capabilities, Methodology, Threat Modeling Process, ThreatModeler

Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....
« Older Entries

Tags

2020 cybersecurity 2020 elections Amazon Application Security application threat model application threat modeling attack surface analysis AWS AWS Security Epics Automated AWS Threat Modeling CDLC Channel Futures CISO cloud computing cloud development life cycle Cloud Security collateral damage cybercrime cybersecurity Dark Reading data breach data breaches Data Security DevOps DevSecOps Dice Forbes internet of things IoT IoT Security one-click threat modeling PC Gamer ransomware Risk Management SC Magazine SCM Magazine Security Boulevard security by design Security Magazine ThreatModeler Threat Modeling Threat Modeling Process threat modeling tool Threat Post ZDNet

Latest Posts

  • Increased Cyber Threats to Medical Devices Cause Healthcare Industry Self-Evaluation
  • When Forbes Says Threat Modeling is Critical You Know it’s Important
  • Understanding the Challenges of Securing Cloud Environments That Never Stop Changing
  • The Role That Threat Modeling Plays in the DevOps Security Process
  • Why Threat Modeling is Essential in Evaluating Policy-Driven Security

About ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s SDLC by identifying, predicting and defining threats, empowering security and DevOps teams to make proactive security decisions. ThreatModeler ™ provides a holistic view of the entire attack surface, enabling enterprises to minimize their overall risk.

Quick Links

  • Attack Surface
  • Automated Threat Modeling
  • Threat Modeling
  • Threat Modeling Methodologies
  • Threat Modeling Software
  • Threat Modeling Tools

Get in Touch

sales@threatmodeler.com
+1-201-266-0510
101 Hudson Street, Suite 2100
Jersey City NJ 07302

© 2022. All Rights Reserved. Design by Tethos Creative.   |   Privacy Policy    |   Terms of Service