Nov 13, 2019 | Attack Surface Analysis, AWS, Cloud security
For the second year in a row, ThreatModeler will host a sponsored booth at the AWS re:Invent conference in Las Vegas. In an endeavor to build community and raise awareness about its product – including existing capabilities and new enhancements – ThreatModeler...
Nov 5, 2019 | Cloud security, DevSecOps, Endoint Security
With cybercrime at an all-time high, achieving an adequate cybersecurity posture within the workplace is as important as ever. Cybersecurity comprises the people, processes and technology that, taken together, maintain IT systems and applications that are free from...
Oct 23, 2019 | Attack Surface Analysis, Cloud security, DevSecOps, Enterprise Threat Modeling, Risk Management, Security
Information security objectives are defined goals and targets that aim to protect an organization’s data from unauthorized access, use, disclosure, disruption, modification, or destruction, thus ensuring its confidentiality, integrity, and availability. They...
Oct 16, 2019 | Attack Surface Analysis, Cloud security, DevSecOps
As more organizations across the major industries migrate to the cloud, architects are finding innovative ways to scale infrastructure and applications, while ensuring speedy time-to-market. AWS is a leading cloud Platform as a Service (PaaS) and is paving the way for...
Oct 15, 2019 | AWS, Cloud security, Threat Modeling
Developer toolboxes are the lifeline for architects to thrive within the software development life cycle (SDLC). A toolbox can comprise a number of solutions, including programming languages, and HTTP servers, load balancers, and databases (both relational and NoSQL)....
Oct 9, 2019 | Cloud security, Enterprise Threat Modeling, Threat Models
Telecom networks tie together and coordinate activity between other critical infrastructures, businesses, government agencies, and individuals. In our highly interconnected cyber ecosystem, virtually everyone relies on telecom networks for “always on” services.[1]...