


ThreatModeler Announces New Patent for IaC-Assist
First of its kind, ThreatModeler’s newly patented technology solution makes the IaC-Assist a proprietary technology – allowing users to truly shift left. ThreatModeler, a leader in securing cloud infrastructure from design to deployment, today announced the...
Cut Risk Analysis Costs Through Automated Threat Modeling
Here at ThreatModeler HQ, we’ve had conversations with customers recently, each telling a similar story. Business owners are signing exceptions to launch products without conducting a complete risk analysis. The reason? Project leaders invested time in manual threat...
ThreatModeler at BlackHat 2019 Cybersecurity Conference
Now in its 22nd year, BlackHat 2019 took place on August 7 and 8 at the Mandalay Bay Convention Center in Las Vegas, Nevada. Joining cyber security experts, hackers, researchers, and vendors, ThreatModeler management attended in full force. This was the first year...
Secure DevOps Starts With Threat Modeling Software
Maintaining a secure DevOps environment is crucial for protecting the private, confidential data maintained by your organization. This rule of thumb applies to DevOps through all stages from design to production. DevOps involves the planning, designing, creating,...