


How Threat Modeling is Being Reinvented Today
Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you can trace it back to the 70s, 80s or 90s. Regardless of the particular starting point, one thing is for sure. From that...
A Case for Automated Threat Modeling
Nobody thinks modeling threats is a bad idea. And yet threat modeling isn’t broadly adopted in the development community yet. Why is that? According to Izar Tarandach and Matthew J. Coles in their book Threat Modeling, it’s because “convincing stakeholders that threat...
The Crucial First Step in Threat Modeling
As threat modeling continues to gain in popularity as an essential cybersecurity process, it may be tempting for newcomers to dive right in, purchase some technology and get going. But that would be putting the cart before the horse. Because threat modeling doesn’t...
ThreatModeler Announces New Patent for IaC-Assist
First of its kind, ThreatModeler’s newly patented technology solution makes the IaC-Assist a proprietary technology – allowing users to truly shift left. ThreatModeler, a leader in securing cloud infrastructure from design to deployment, today announced the...