


Advantages of Modular Threat Modeling
Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages these to great advantage in reusing these patterns in threat modeling. Be it either components or templates of groups...
What Is One-Click Cloud Threat Modeling?
A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due to COVID, compared to 16.4% among companies that plan to move to the cloud in 2021.” In a fast changing world, those...
Six Steps to Threat Modeling for Secure Data Assets
For software and application development teams, data assets represent the culmination of years, even decades, of iterative hard work towards building business value. If put into the wrong hands, compromised data assets may ruin client relationships, lead to even...
Threat Modeling: Are Data Flow Diagrams Enough?
By Stuart Winter-Tear, Director of Sales Engineering, ThreatModeler Software, Inc. As part of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), a paper was reviewed and accepted entitled: “Security Threat Modeling: Are...