Jan 22, 2020 | Attack Surface Analysis, DevOps, Extended Capabilities, Methodology, Threat Modeling Process, ThreatModeler
Threat modeling is catching on. Increasingly, organizations are coming to the realization that securing DevOps projects as early as possible – preferably during the initial whiteboard planning and design stages – not only reduces risk, it makes good business sense....
Aug 18, 2017 | Extended Capabilities, ThreatModeler
In our previous articles comparing ThreatModeler™ and Microsoft Threat Modeling Tool (Microsoft TMT), we considered the tools from an AppSec perspective and the CISO’s perspective. In this installment, we compare the capacity of each to provide outputs based on...
Aug 1, 2017 | Extended Capabilities, Threat Modeling, ThreatModeler
Threat modeling has a well-proven capacity to provide agile DevOps teams a “security heads-up,” during project design, especially in cases where application security is a critical priority. In our previous article comparing Microsoft’s Threat Modeling Tool (TMT) to...