Cloud adoption is on the rise. And thanks to the pandemic, the rate of adoption is accelerating. Worth an already...
Our Blog
Where are You in Your Threat Modeling Journey?
We like to say that to do it right, threat modeling cannot be a one-time project. Your threat modeling journey must be...
6 Steps to Threat Model with Infrastructure as Code
When doing Infrastructure as Code (IaC), threat modeling is crucial for identifying and addressing potential security...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
ThreatModeler©, a leader in threat modeling from design to code to cloud, today announced the launch of IaC-Assist...
ThreatModeler Launched IaC-Assist 2.0
ThreatModeler© announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures...
It pays to malvertise. MOVEit vulnerability remediation. Ransomware trends. FSB cyberespionage. Influence operators taken down.
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0 (PR...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
ThreatModeler, a leader in threat modeling from design to code to cloud, announced the launch of IaC-Assist 2.0,...
ThreatModeler Releases IaC-Assist 2.0
ThreatModeler announced the launch of IaC-Assist 2.0, an integrated development environment (IDE) that secures...
ThreatModeler Sets New Standard for Securing Infrastructure as Code with Launch of IaC-Assist 2.0
Patented one-click solution detects security controls, applies mitigations, and ensures compliance for Terraform,...
The One Thing That Can Make Your Threat Modeling Easy
Companies are starting to recognize the value (and requirements) of doing threat models for their applications and...
Five Things to Look for in a Threat Modeling Tool
Organizations are starting to warm up to the idea that they need to implement threat modeling. After all, it’s not...
Threat Modeling for Telecom Companies
In many ways, telecom companies are no different than other companies when it comes to cybersecurity. They’re...