Skip to content

When GPS Assumptions Fail: Lessons for Threat Modeling

By ThreatModeler

Introduction: A Threat Advisory That Demands More Than Awareness A recent advisory from threat modeling expert firm Shostack + Associates on GPS spoofing and jamming has prompted many organizations to revisit their threat models. The guidance is simple. If your systems rely on GPS, it is time to reassess what that dependency means today. GPS…

2026 Predictions: AI-Acceleration Will Shift Security Back to Design

By ThreatModeler

In 2026, the AI hype period ends as the pressure to deliver real, measurable results from secure AI initiatives intensifies.”  — Sharyn Leaver, Chief Research Officer, Forrester After years of accelerating cyber risk, 2026 will mark a turning point. Not because attacks slow down, but because organizations will have to confront a harder truth. Reactive…

ThreatModeler Acquires IriusRisk to Build Seamless Security For Enterprises In the AI Coding Era

By jlowe

Jersey City, N.J. — January 8, 2026 — ThreatModeler, the innovation leader in AI-driven threat modeling, today announced it has acquired IriusRisk, bringing together the top two enterprise threat modeling platforms to expand global scale, accelerate innovation, and deliver greater customer value in a surging $30 billion application security market.  The acquisition positions ThreatModeler as…

Why Healthcare M&A Requires Threat Modeling — Before the Deal Closes

By ThreatModeler

By Krishna Bala, CTO, ThreatModeler Having spent a significant part of my career working in and alongside healthcare organizations, I’ve seen firsthand how growth through acquisition can accelerate innovation, expand access to care, and strengthen market position. I’ve also seen how it can quietly introduce risk at a scale few organizations fully appreciate. In healthcare,…

Start Left At Design: Lessons From a CISO Panel

By ThreatModeler

By Mike LeBlanc, Chief Revenue Officer, ThreatModeler Last week, I sat in on a CISO panel discussion, and one theme kept coming up. No matter how different their environments were, they all said the same thing in one way or another: teams are trying to shift left — but most of the pain still shows…

Securing Cloud Infrastructure at Scale with ThreatModeler and HashiCorp

By ThreatModeler

Cloud infrastructure has become the foundation of modern innovation. But as organizations move faster and scale across multiple environments, ensuring consistent security becomes increasingly complex. To help enterprises address the growing challenges of securing cloud infrastructure at scale, ThreatModeler and HashiCorp partnered to bring together two areas of strength: Infrastructure as Code and intelligent threat…

ThreatModeler Introduces Intelligent Threat Modeling to Help Enterprises Tackle AI and Cloud Risk

By ThreatModeler

Jersey City, NJ — Sept. 23, 2025 — ThreatModeler, the innovation leader in automated threat modeling, today announced the launch of Intelligent Threat Modeling© to help enterprises accelerate risk mitigation and streamline secure-by-design practices in AI-driven and cloud-native development environments. A recent ThreatModeler market study revealed that 75 percent of enterprise security professionals lacked high…

Automated Threat Modeling for Healthcare: Scaling Secure-by-Design Without Slowing Innovation

By ThreatModeler

Introduction: The Real Healthcare Security Challenge Healthcare is transforming faster than ever. Cloud-based Electronic Health Records (EHRs), connected medical devices, and telehealth platforms are reshaping patient care. But manual threat modeling can’t keep pace.  The gap is clear: Security in healthcare needs to speed up to keep pace with tomorrow’s innovations. This forces leaders to…

Why Threat Modeling Your Third-Party Integrations Should Be Standard Practice

By ThreatModeler

Secure the architecture, not just the contract Most security teams wouldn’t dream of exposing an admin panel on a public login screen without multi-factor authentication, let alone using a password like “123456.” But when it’s a third-party vendor? That kind of risk often slips through the cracks. That’s precisely what happened when Paradox.ai, an AI…

Modern Threat Modeling for Financial Services: Cybersecurity and Compliance at Scale

By ThreatModeler

In today’s fast-paced financial landscape, cybersecurity is no longer optional. It’s foundational to business continuity, regulatory compliance, and operational resilience. As banks, trading platforms, and fintech services accelerate cloud adoption, threat actors are evolving in sophistication and scale. The result is a surge in sophisticated attacks targeting financial systems, APIs, infrastructure, and supply chains. As…

Threat Modeling for Critical Infrastructure

By ThreatModeler

It’s not surprising that we have to protect our critical infrastructure from cyberattacks. What might be a surprise is what all constitutes critical infrastructure. There are actually 16 sectors where the United States government has set up critical infrastructure cybersecurity. “These ‘sectors’ are areas in which both public and private organizations provide vital ‘assets, services,…