Jan 20, 2020 | CISO, DevOps, DevSecOps, Enterprise DevSecOps, Enterprise Threat Modeling, Threat Modeling
Application Threat modeling is a structured and methodical approach that allows you to identify potential threats to applications, classify them by risk, and prioritize mitigation efforts. CISOs and other senior leaders leverage threat model ouput to drive decision...
Jan 16, 2020 | CISO, Cloud security, DevOps, ThreatModeler
Cloud computing is now one of the most pervasive technology trends in technology, as more companies migrate to cloud computing. The cloud continues to gain momentum as more organizations adopt the use of this software service over monolithic applications. In today’s...
Dec 16, 2019 | CISO, Cloud security, Cloud Threat Modeling, Security, Threat Models
The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach. This article reviews the potential damages that can occur with a social profile...
Sep 26, 2019 | Attack Surface Analysis, CISO, DevSecOps, Events, Methodology, Threat Modeling Process
On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit. Alex Bauert, CISSP, CSSLP – ThreatModeler’s Senior Director of Threat Research – sat alongside esteemed Tech Accord panel...
Jan 24, 2018 | CISO, Enterprise Threat Modeling
Threat modeling for critical and high-risk application security has been a mainstay of software development for nearly a decade. The immediate benefits of application threat modeling include reducing application security risk and lowering production costs as potential...
Apr 5, 2017 | CISO, Compensating Controls, Risk Management
Compensating controls are cyber security mechanisms put in place to satisfy specific security compliance standards for regulatory purposes[1] or to meet a manufacturer’s guidelines.[2] Such controls are not intended to be less stringent. Rather, the controls must – at...