Sep 7, 2023 | CISO, Cloud security, Cloud Threat Modeling, Cyber Risk, DevSecOps, Press Release, Recent News, Threat Modeling
By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative for proactive risk assessment and mitigation has never been greater. Much like CAD drawings provide a blueprint for...
May 27, 2021 | CISO, Cloud security, Enterprise Threat Modeling, Recent News, Threat Modeling Process
ThreatModeler has seen a significant uptick in US federal government agencies and contractors approaching us to find out more about automating the labor intensive manual process of threat modeling. Those charged with proactively managing NIST 800-53 Rev. 5...
Mar 24, 2021 | CISO, Cloud security, Enterprise Threat Modeling, Recent News, Threat Modeling Process
Architectural patterns are those blocks of functions or components that tend to repeat over and again in systems and software. ThreatModeler leverages these to great advantage in reusing these patterns in threat modeling. Be it either components or templates of groups...
Feb 10, 2021 | CISO, Cloud security, Enterprise Threat Modeling, Recent News, Threat Modeling Process
A recent survey by Deloitte unearthed the extraordinary fact that “only 5.8% of professionals in cloud-savvy organizations experienced slowdown due to COVID, compared to 16.4% among companies that plan to move to the cloud in 2021.” In a fast changing world, those...
Dec 10, 2020 | Attack Surface Analysis, CISO, Cyber Risk, DevOps, Enterprise Threat Modeling, Risk Management, Security, SOAR
This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below: https://www.youtube.com/watch?v=HMerd-BKaYc&list=PLUJfsMmlclPSfFtn2yYGPI-4jq_NA40aJ&index=6 Security Orchestration Automation Response...
Oct 8, 2020 | Attack Surface Analysis, AWS, CISO, Cloud security, security controls
The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to secure brave new features such as containers, microservices and automatic scaling. Threat modeling, traditionally a manual...